FKIE_CVE-2023-48708
Vulnerability from fkie_nvd - Published: 2023-11-24 18:15 - Updated: 2024-11-21 08:32
Severity ?
5.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user's authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 | |
| codeigniter | shield | 1.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "B1E3F1E0-C2D7-4EC5-AD04-AEB414A3D71C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8DDA8B62-EE63-40C0-9F2C-23F56B225F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "4F37B4E1-D641-4D55-9D3F-FB3B18934FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "3361F9CD-A084-4437-BF22-08A558C326B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "AEF20FB8-F114-4B54-8CEF-739433359E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "340EBC7C-51FC-4792-A0A4-A323219D1551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codeigniter:shield:1.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "061CA3F7-EDAD-4D04-AFBC-9ABD22470AF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user\u0027s authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files."
},
{
"lang": "es",
"value": "CodeIgniter Shield es un proveedor de autenticaci\u00f3n y autorizaci\u00f3n para CodeIgniter 4. En las versiones afectadas, los intentos de inicio de sesi\u00f3n exitosos se registran con los tokens sin procesar almacenados en la tabla de registro. Si una persona malintencionada de alguna manera ve los datos en la tabla de registro, puede obtener un token sin procesar que luego puede usarse para enviar una solicitud con la autoridad de ese usuario. Este problema se solucion\u00f3 en la versi\u00f3n 1.0.0-beta.8. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben desactivar el registro para intentar iniciar sesi\u00f3n exitosamente mediante los archivos de configuraci\u00f3n."
}
],
"id": "CVE-2023-48708",
"lastModified": "2024-11-21T08:32:18.263",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 4.2,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-24T18:15:07.520",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://codeigniter4.github.io/shield/getting_started/authenticators/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/codeigniter4/shield/commit/7e84c3fb3411294f70890819bfe51781bb9dc8e4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/codeigniter4/shield/security/advisories/GHSA-j72f-h752-mx4w"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://codeigniter4.github.io/shield/getting_started/authenticators/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/codeigniter4/shield/commit/7e84c3fb3411294f70890819bfe51781bb9dc8e4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/codeigniter4/shield/security/advisories/GHSA-j72f-h752-mx4w"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…