Skip to content

Decidim vulnerable to data disclosure through the embed feature

Moderate severity GitHub Reviewed Published Jul 10, 2024 in decidim/decidim • Updated Jul 11, 2024

Package

decidim (RubyGems)

Affected versions

< 0.27.6

Patched versions

0.27.6

Description

Impact

If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embedded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed.

Patches

version 0.27.6

decidim/decidim@1756fa6

Workarounds

Disallow access through your web server to the URLs finished with /embed.html

References

@andreslucena andreslucena published to decidim/decidim Jul 10, 2024
Published to the GitHub Advisory Database Jul 10, 2024
Reviewed Jul 10, 2024
Published by the National Vulnerability Database Jul 10, 2024
Last updated Jul 11, 2024

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2024-27090

GHSA ID

GHSA-qcj6-vxwx-4rqv

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.