-
-
Notifications
You must be signed in to change notification settings - Fork 221
/
CVE-2023-34090.yml
34 lines (29 loc) · 1.5 KB
/
CVE-2023-34090.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
---
gem: decidim-meetings
cve: 2023-34090
ghsa: jm79-9pm4-vrw9
url: https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9
title: Decidim vulnerable to sensitive data disclosure
date: 2023-07-11
description: |
Note: added the actual report as a [comment](https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9#advisory-comment-81110).
### Summary
Decidim, a platform for digital citizen participation, uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table).
### Impact
This issue may lead to Sensitive Data Disclosure.
### Patches
The problem was patched in [v0.27.3](https://github.com/decidim/decidim/releases/tag/v0.27.3).
### Workarounds
Disable or unpublish all meetings components from your application.
cvss_v3: 7.5
unaffected_versions:
- "< 0.27.0"
patched_versions:
- ">= 0.27.3"
related:
url:
- https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9
- https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9#advisory-comment-81110
- https://nvd.nist.gov/vuln/detail/CVE-2023-34090
- https://github.com/decidim/decidim/releases/tag/v0.27.3
- https://github.com/advisories/GHSA-jm79-9pm4-vrw9