Description
An authorization bypass exploited by a user-controlled key in SpecificApps REST API in ScratchOAuth2 before commit d856dc704b2504cd3b92cf089fdd366dd40775d6 allows app owners to set flags that indicate whether an app is verified on their own apps.
Published: 2022-02-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-32949 An authorization bypass exploited by a user-controlled key in SpecificApps REST API in ScratchOAuth2 before commit d856dc704b2504cd3b92cf089fdd366dd40775d6 allows app owners to set flags that indicate whether an app is verified on their own apps.
History

No history.

Subscriptions

Scratchoauth2 Project Scratchoauth2
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T05:02:10.866Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2021-46249

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-15T23:15:07.917

Modified: 2024-11-21T06:33:48.913

Link: CVE-2021-46249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses