In RACTF before commit f3dc89b, unauthenticated users are able to get the value of sensitive config keys that would normally be hidden to everyone except admins. All versions after commit f3dc89b9f6ab1544a289b3efc06699b13d63e0bd(3/10/20) are patched.
References
Link | Resource |
---|---|
https://github.com/ractf/core/commit/f3dc89b9f6ab1544a289b3efc06699b13d63e0bd | Patch Vendor Advisory |
https://github.com/ractf/core/security/advisories/GHSA-ph67-c355-52vm | Vendor Advisory |
https://github.com/ractf/core/commit/f3dc89b9f6ab1544a289b3efc06699b13d63e0bd | Patch Vendor Advisory |
https://github.com/ractf/core/security/advisories/GHSA-ph67-c355-52vm | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ractf/core/commit/f3dc89b9f6ab1544a289b3efc06699b13d63e0bd - Patch, Vendor Advisory | |
References | () https://github.com/ractf/core/security/advisories/GHSA-ph67-c355-52vm - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.9 |
Information
Published : 2020-10-05 16:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15235
Mitre link : CVE-2020-15235
CVE.ORG link : CVE-2020-15235
JSON object : View
Products Affected
ractf
- core
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor