Skip to content

zfr authentication adapter did not verify validity of tokens

High severity GitHub Reviewed Published Jun 7, 2024 to the GitHub Advisory Database

Package

composer zfr/zfr-oauth2-server-module (Composer)

Affected versions

< 0.1.2

Patched versions

0.1.2

Description

Previous to @2ca5bb1c2f11537be8f94ca6867d8d69789e744a (release 0.1.2), tokens weren't checked for validity/expiration.

This potentially caused a security issue if expired tokens were not deleted after the expiration time was past, allowing anyone to still use invalidated authentication credentials.

References

Published to the GitHub Advisory Database Jun 7, 2024
Reviewed Jun 7, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-rcm4-jv5g-wccm
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.