Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01NjUzLTQzN2YtNWhtY806oQ
Denial of service
The use of String.to_atom/1
in PowAssent is susceptible to denial of service attacks. In PowAssent.Phoenix.AuthorizationController
a value is fetched from the user provided params, and String.to_atom/1
is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01NjUzLTQzN2YtNWhtY806oQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.0007
EPSS Percentile: 0.32564
Identifiers: GHSA-5653-437f-5hmc, CVE-2019-16764
References:
- https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986
- https://nvd.nist.gov/vuln/detail/CVE-2019-16764
- https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf
- https://hex.pm/packages/pow_assent
- http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1
- https://github.com/advisories/GHSA-5653-437f-5hmc
Blast Radius: 9.7
Affected Packages
hex:pow_assent
Dependent packages: 1Dependent repositories: 31
Downloads: 337,256 total
Affected Version Ranges: < 0.4.4
Fixed in: 0.4.4
All affected versions: 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.3.0, 0.3.1, 0.3.2, 0.4.0, 0.4.1, 0.4.2, 0.4.3
All unaffected versions: 0.4.4, 0.4.5, 0.4.6, 0.4.7, 0.4.8, 0.4.9, 0.4.10, 0.4.11, 0.4.12, 0.4.13, 0.4.14, 0.4.15, 0.4.16, 0.4.17, 0.4.18