Impact
This vulnerability involves a path traversal flaw in the scope validation logic of the SciTokens library. When the library normalizes the path specified in a token's scope claim and the path requested by the application, it then compares them using a simple startswith check. An attacker can embed the sequence ".." in the scope claim to escape the intended directory restriction. As a result, the library incorrectly allows access to resources outside the authorized directory, effectively bypassing the prescribed authorization controls.
Affected Systems
The flaw affects the SciTokens reference library, specifically all releases prior to version 1.9.7. Users incorporating this library into their services or applications are at risk unless the library has been upgraded. Any deployment that relies on the older versions should identify where the library is used and assess the potential for unauthorized file access beyond the intended scope.
Risk and Exploitability
The CVSS score of 8.1 classifies this as a high‑severity vulnerability. EPSS indicates an exploration probability of less than 1 %, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves the issuance or manipulation of authorization tokens containing a crafted scope claim. If an attacker can obtain or forge such a token, they may gain unauthorized access to resources beyond the intended directory restriction.
OpenCVE Enrichment
Github GHSA