Vulnerability Details : CVE-2020-15223
In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.34.0, the `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. This is fixed in version 0.34.0
Products affected by CVE-2020-15223
- cpe:2.3:a:ory:fosite:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15223
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15223
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:N |
4.9
|
4.9
|
NIST | |
8.0
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N |
1.6
|
5.8
|
NIST | |
8.0
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N |
1.6
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-15223
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by: nvd@nist.gov (Primary)
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-15223
-
https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm
Ignored storage errors on token revokation · Advisory · ory/fosite · GitHubThird Party Advisory
-
https://tools.ietf.org/html/rfc7009#section-2.2.1
RFC 7009 - OAuth 2.0 Token RevocationThird Party Advisory
-
https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
Merge pull request from GHSA-7mqr-2v3q-v2wm · ory/fosite@03dd558 · GitHubPatch;Third Party Advisory
Jump to