Skip to content

Missing Authorization check allows certain operations on CLA Assistant data

High
Shegox published GHSA-gw8p-frwv-25gh Aug 15, 2023

Package

github.com/cla-assistant/cla-assistant

Affected versions

<=v2.13.0

Patched versions

v2.13.1

Description

Impact

A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant.
The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.

We urge everyone self-hosting CLA-Assistant to update immediately.

Impact on cla-assistant.io

The hosted instance of cla-assistant.io got patched on the 2023-07-28 at 07:15 UTC. Before that, this same bug could have been exploited on cla-assistant.io.

Patches

This problem has been patched in release v2.13.1.

Workarounds

There is no workaround available.

Acknowledgements

Big thanks to @darmiel for finding and creating a patch for this during his work on cla-assistant.

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVE ID

CVE-2023-39438

Credits