Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.12.2025.7394.1
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu: Security Advisory (USN-7394-1)
Zusammenfassung:The remote host is missing an update for the 'ruby-doorkeeper' package(s) announced via the USN-7394-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ruby-doorkeeper' package(s) announced via the USN-7394-1 advisory.

Vulnerability Insight:
Jonathan Clem and Justin Bull discovered that Doorkeeper could allow
arbitrary token revocation and replay attacks. An attacker could possibly
use this issue to gain unauthorized access to a system. (CVE-2016-6582)

It was discovered that Doorkeeper incorrectly handled storing client names.
An attacker could possibly use this issue to execute a cross-site
scripting (XSS) attack. (CVE-2018-1000088)

Affected Software/OS:
'ruby-doorkeeper' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-6582
BugTraq ID: 92551
http://www.securityfocus.com/bid/92551
Bugtraq: 20160818 [CVE-2016-6582] Doorkeeper gem does not revoke tokens & uses wrong auth/auth method (Google Search)
http://www.securityfocus.com/archive/1/539268/100/0/threaded
http://seclists.org/fulldisclosure/2016/Aug/105
http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-1000088
https://github.com/doorkeeper-gem/doorkeeper/issues/969
https://github.com/doorkeeper-gem/doorkeeper/pull/970
https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0
https://github.com/rubysec/ruby-advisory-db/pull/328/files
CopyrightCopyright (C) 2025 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.