Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link.. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
References
Link | Resource |
---|---|
https://github.com/doorkeeper-gem/doorkeeper/issues/969 | Issue Tracking |
https://github.com/doorkeeper-gem/doorkeeper/pull/970 | Issue Tracking |
https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0 | Release Notes |
https://github.com/rubysec/ruby-advisory-db/pull/328/files | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-03-13 15:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-1000088
Mitre link : CVE-2018-1000088
CVE.ORG link : CVE-2018-1000088
JSON object : View
Products Affected
doorkeeper_project
- doorkeeper
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')