First published: Mon Dec 18 2023(Updated: )
### Impact _What kind of vulnerability is it? Who is impacted?_ Original Report: > The Oauth2 PKCE implementation is vulnerable in 2 ways: > 1. The `authCodeVerifier` should be removed after usage (similar to 'authState') > 2. There is a risk for a "downgrade attack" if PKCE is being relied on for CSRF protection. ### Patches _Has the problem been patched? What versions should users upgrade to?_ 2.2.15 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ not known yet. ### References _Are there any links users can visit to find out more?_
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/yiisoft/yii2-authclient | <2.2.15 | 2.2.15 |
Yiiframework Yii2-authclient | <2.2.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50714 is classified with a moderate severity due to vulnerabilities in the Oauth2 PKCE implementation.
To remediate CVE-2023-50714, upgrade to version 2.2.15 or later of the yii2-authclient package.
CVE-2023-50714 is susceptible to downgrading attacks due to improper handling of the authCodeVerifier.
CVE-2023-50714 affects all versions of the yii2-authclient package up to version 2.2.15.
Developers using the yii2-authclient package for Oauth2 PKCE authentication are primarily impacted by CVE-2023-50714.