Incorrect Authentication Implementation Affecting doorkeeper package, versions < 4.2.0, >= 1.2.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.14% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authentication Implementation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-DOORKEEPER-20272
  • published17 Aug 2016
  • disclosed17 Aug 2016
  • creditJustin Bull

Introduced: 17 Aug 2016

CVE-2016-6582  (opens in a new tab)
CWE-284  (opens in a new tab)

Overview

doorkeeper is an Oauth 2.0 provider for Rails and Grape.

Affected versions incorrectly implement Oauth 2.0 Token Revocation (RFC 7009). Specifically, public clients making an unauthenticated calls to revoke a token would not have their tokens revoked. In addition, a compromised confidential client can be used to revoke tokens of other users.

CVSS Scores

version 3.1