CVE-2023-37260 (GCVE-0-2023-37260)
Vulnerability from cvelistv5
Published
2023-07-06 15:09
Modified
2024-11-06 16:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
league/oauth2-server is an implementation of an OAuth 2.0 authorization server written in PHP. Starting in version 8.3.2 and prior to version 8.5.3, servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 to receive the patch. As a workaround, pass the key as a file instead of a string.
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| thephpleague | oauth2-server |
Version: >= 8.3.2, < 8.5.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:09:33.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm"
},
{
"name": "https://github.com/thephpleague/oauth2-server/pull/1353",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/thephpleague/oauth2-server/pull/1353"
},
{
"name": "https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "oauth2-server",
"vendor": "oauth2-server_project",
"versions": [
{
"lessThan": "8.5.3",
"status": "affected",
"version": "8.3.2",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37260",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-06T16:48:43.827167Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T16:50:12.981Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "oauth2-server",
"vendor": "thephpleague",
"versions": [
{
"status": "affected",
"version": "\u003e= 8.3.2, \u003c 8.5.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "league/oauth2-server is an implementation of an OAuth 2.0 authorization server written in PHP. Starting in version 8.3.2 and prior to version 8.5.3, servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 to receive the patch. As a workaround, pass the key as a file instead of a string."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-209",
"description": "CWE-209: Generation of Error Message Containing Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-06T15:09:08.856Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm"
},
{
"name": "https://github.com/thephpleague/oauth2-server/pull/1353",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/thephpleague/oauth2-server/pull/1353"
},
{
"name": "https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3"
}
],
"source": {
"advisory": "GHSA-wj7q-gjg8-3cpm",
"discovery": "UNKNOWN"
},
"title": "league/oauth2-server key exposed in exception message when passing as string and providing invalid pass phrase"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-37260",
"datePublished": "2023-07-06T15:09:08.856Z",
"dateReserved": "2023-06-29T19:35:26.437Z",
"dateUpdated": "2024-11-06T16:50:12.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm\", \"name\": \"https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/thephpleague/oauth2-server/pull/1353\", \"name\": \"https://github.com/thephpleague/oauth2-server/pull/1353\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3\", \"name\": \"https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:09:33.813Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-37260\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-06T16:48:43.827167Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:*:*:*\"], \"vendor\": \"oauth2-server_project\", \"product\": \"oauth2-server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.3.2\", \"lessThan\": \"8.5.3\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-06T16:50:06.820Z\"}}], \"cna\": {\"title\": \"league/oauth2-server key exposed in exception message when passing as string and providing invalid pass phrase\", \"source\": {\"advisory\": \"GHSA-wj7q-gjg8-3cpm\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"thephpleague\", \"product\": \"oauth2-server\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 8.3.2, \u003c 8.5.3\"}]}], \"references\": [{\"url\": \"https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm\", \"name\": \"https://github.com/thephpleague/oauth2-server/security/advisories/GHSA-wj7q-gjg8-3cpm\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/thephpleague/oauth2-server/pull/1353\", \"name\": \"https://github.com/thephpleague/oauth2-server/pull/1353\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3\", \"name\": \"https://github.com/thephpleague/oauth2-server/releases/tag/8.5.3\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"league/oauth2-server is an implementation of an OAuth 2.0 authorization server written in PHP. Starting in version 8.3.2 and prior to version 8.5.3, servers that passed their keys to the CryptKey constructor as as string instead of a file path will have had that key included in a LogicException message if they did not provide a valid pass phrase for the key where required. This issue has been patched so that the provided key is no longer exposed in the exception message in the scenario outlined above. Users should upgrade to version 8.5.3 to receive the patch. As a workaround, pass the key as a file instead of a string.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-209\", \"description\": \"CWE-209: Generation of Error Message Containing Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-07-06T15:09:08.856Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-37260\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-06T16:50:12.981Z\", \"dateReserved\": \"2023-06-29T19:35:26.437Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-07-06T15:09:08.856Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…