A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.
References
Link | Resource |
---|---|
https://github.com/cla-assistant/cla-assistant/security/advisories/GHSA-gw8p-frwv-25gh | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-08-15 17:15
Updated : 2023-08-22 17:32
NVD link : CVE-2023-39438
Mitre link : CVE-2023-39438
CVE.ORG link : CVE-2023-39438
JSON object : View
Products Affected
sap
- contributor_license_agreement_assistant