Cross-site request forgery (CSRF) Affecting doorkeeper package, versions < 2.0.0, >= 1.5 < 1.4.1
Threat Intelligence
EPSS
0.16% (54th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-DOORKEEPER-20203
- published 17 Dec 2014
- disclosed 17 Dec 2014
- credit Sergey Belov, Phill Baker
Introduced: 17 Dec 2014
CVE-2014-8144 Open this link in a new tabOverview
doorkeeper
is an Oauth 2.0 provider for Rails and Grape.
Affected versions contain a Cross-site request forgery (CSRF) vulnerability that allows remote attackers to hijack the user's OAuth autorization code. Without CSRF protection on its endpoints, Doorkeeper exposes a user's authorization code with arbitrary scope.
CVSS Scores
version 3.1