First published: Tue Aug 15 2023(Updated: )
A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Contributor License Agreement Assistant | <2.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39438.
The severity of CVE-2023-39438 is high with a CVSS score of 8.1.
The CLA-assistant software with versions up to exclusive 2.13.1 is affected by CVE-2023-39438.
The vulnerability allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant, potentially exposing sensitive information.
Yes, a fix is available for CVE-2023-39438. It is recommended to update to a version beyond 2.13.1 to mitigate the vulnerability.