Vulnerability Description
A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Contributor License Agreement Assistant | < 2.13.1 |
Related Weaknesses (CWE)
References
- https://github.com/cla-assistant/cla-assistant/security/advisories/GHSA-gw8p-frwVendor Advisory
- https://github.com/cla-assistant/cla-assistant/security/advisories/GHSA-gw8p-frwVendor Advisory
FAQ
What is CVE-2023-39438?
CVE-2023-39438 is a vulnerability with a CVSS score of 8.1 (HIGH). A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary aut...
How severe is CVE-2023-39438?
CVE-2023-39438 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39438?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Contributor License Agreement Assistant.