Information Exposure Affecting decidim-participatory_processes package, versions <0.27.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-DECIDIMPARTICIPATORYPROCESSES-7443364
  • published 11 Jul 2024
  • disclosed 10 Jul 2024
  • credit Unknown

How to fix?

Upgrade decidim-participatory_processes to version 0.27.6 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure via the embed feature. An attacker can access unpublished or private resource data by inferring the slug or URL of the resource that can be embedded.

Note: This is only exploitable if the resource allows embedding and is not publicly accessible.

Workaround

Users that are not able to upgrade to the fixed version can mitigate the vulnerability by disallowing access through the web server to the URLs finished with /embed.html

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.9 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    Low
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None