Filtered by vendor Scratchoauth2 Project
Subscriptions
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-46251 | 1 Scratchoauth2 Project | 1 Scratchoauth2 | 2024-11-21 | 6.1 Medium |
A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request. | ||||
CVE-2021-46250 | 1 Scratchoauth2 Project | 1 Scratchoauth2 | 2024-11-21 | 10 Critical |
An issue in SOA2Login::commented of ScratchOAuth2 before commit a91879bd58fa83b09283c0708a1864cdf067c64a allows attackers to authenticate as other users on downstream components that rely on ScratchOAuth2. | ||||
CVE-2021-46249 | 1 Scratchoauth2 Project | 1 Scratchoauth2 | 2024-11-21 | 6.5 Medium |
An authorization bypass exploited by a user-controlled key in SpecificApps REST API in ScratchOAuth2 before commit d856dc704b2504cd3b92cf089fdd366dd40775d6 allows app owners to set flags that indicate whether an app is verified on their own apps. | ||||
CVE-2021-29437 | 1 Scratchoauth2 Project | 1 Scratchoauth2 | 2024-11-21 | 8 High |
ScratchOAuth2 is an Oauth implementation for Scratch. Any ScratchOAuth2-related data normally accessible and modifiable by a user can be read and modified by a third party. 1. Scratch user visits 3rd party site. 2. 3rd party site asks user for Scratch username. 3. 3rd party site pretends to be user and gets login code from ScratchOAuth2. 4. 3rd party site gives code to user and instructs them to post it on their profile. 5. User posts code on their profile, not knowing it is a ScratchOAuth2 login code. 6. 3rd party site completes login with ScratchOAuth2. 7. 3rd party site has full access to anything the user could do if they directly logged in. See referenced GitHub security advisory for patch notes and workarounds. |
Page 1 of 1.