Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01ZzY2LTYyOGYtN2N2as4AA4Lx
Omniauth::MicrosoftGraph Account takeover (nOAuth)
Summary
The implementation did not validate the legitimacy of the email
attribute of the user nor did it give/document an option to do so, making it susceptible to nOAuth misconfiguration in cases when the email
is used as a trusted user identifier
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01ZzY2LTYyOGYtN2N2as4AA4Lx
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 4 months ago
Updated: 4 months ago
CVSS Score: 8.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Identifiers: GHSA-5g66-628f-7cvj, CVE-2024-21632
References:
- https://github.com/synth/omniauth-microsoft_graph/security/advisories/GHSA-5g66-628f-7cvj
- https://nvd.nist.gov/vuln/detail/CVE-2024-21632
- https://github.com/synth/omniauth-microsoft_graph/commit/5ffd62690ca0e46978f2fc7d83b18d28edde7795
- https://github.com/synth/omniauth-microsoft_graph/commit/f132078389612b797c872b45bd0e0b47382414c1
- https://www.descope.com/blog/post/noauth
- https://github.com/advisories/GHSA-5g66-628f-7cvj
Blast Radius: 9.0
Affected Packages
rubygems:omniauth-microsoft_graph
Dependent packages: 0Dependent repositories: 11
Downloads: 711,980 total
Affected Version Ranges: < 2.0.0
Fixed in: 2.0.0
All affected versions: 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 1.0.0, 1.1.0, 1.2.0
All unaffected versions: 2.0.0