Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qNzJmLWg3NTItbXg0d84AA3VH

Insertion of Sensitive Information into Log

Impact

If successful login attempts are recorded, the raw tokens are stored in the log table.
If a malicious person somehow views the data in the log table, he or she can obtain a raw token, which can then be used to send a request with that user's authority.

When you (1) use the following authentiactors,

and you (2) log successful login attempts, the raw tokens are stored.

Patches

Upgrade to Shield v1.0.0-beta.8 or later.

Workarounds

Disable logging for successful login attempts by the configuration files.

References

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-j72f-h752-mx4w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qNzJmLWg3NTItbXg0d84AA3VH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 5 months ago
Updated: 5 months ago


CVSS Score: 5.0
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N

Identifiers: GHSA-j72f-h752-mx4w, CVE-2023-48708
References: Repository: https://github.com/codeigniter4/shield
Blast Radius: 7.7

Affected Packages

packagist:codeigniter4/shield
Dependent packages: 7
Dependent repositories: 35
Downloads: 102,692 total
Affected Version Ranges: < 1.0.0-beta.8
Fixed in: 1.0.0-beta.8
All affected versions: 1.0.0-beta, 1.0.0-beta.2, 1.0.0-beta.3, 1.0.0-beta.4, 1.0.0-beta.5, 1.0.0-beta.6, 1.0.0-beta.7
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3