cve-2023-48220
Vulnerability from cvelistv5
Published
2024-02-20 17:24
Modified
2025-04-24 15:04
Summary
Decidim is a participatory democracy framework. Starting in version 0.4.rc3 and prior to version 2.0.9 of the `devise_invitable` gem, the invites feature allows users to accept the invitation for an unlimited amount of time through the password reset functionality. This issue creates vulnerable dependencies starting in version 0.0.1.alpha3 and prior to versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems. When using the password reset functionality, the `devise_invitable` gem always accepts the pending invitation if the user has been invited. The only check done is if the user has been invited but the code does not ensure that the pending invitation is still valid as defined by the `invite_for` expiry period. Decidim sets this configuration to `2.weeks` so this configuration should be respected. The bug is in the `devise_invitable` gem and should be fixed there and the dependency should be upgraded in Decidim once the fix becomes available. `devise_invitable` to version `2.0.9` and above fix this issue. Versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems contain this fix. As a workaround, invitations can be cancelled directly from the database.
References
security-advisories@github.comhttps://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134Product
security-advisories@github.comhttps://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34Patch
security-advisories@github.comhttps://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454Patch
security-advisories@github.comhttps://github.com/decidim/decidim/releases/tag/v0.26.9Release Notes
security-advisories@github.comhttps://github.com/decidim/decidim/releases/tag/v0.27.5Release Notes
security-advisories@github.comhttps://github.com/decidim/decidim/releases/tag/v0.28.0Release Notes
security-advisories@github.comhttps://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwpMitigation, Patch, Vendor Advisory
security-advisories@github.comhttps://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198Product
security-advisories@github.comhttps://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/releases/tag/v0.26.9Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/releases/tag/v0.27.5Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/releases/tag/v0.28.0Release Notes
af854a3a-2127-422b-91ae-364da2661108https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwpMitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098Patch
Impacted products
Vendor Product Version
decidim decidim Version: >= 0.0.1.alpha3, < 0.26.9
Version: >= 0.27.0, < 0.27.5
Version: >= 0.4.rc3, < 2.0.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:decidim:decidim:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "decidim",
                  vendor: "decidim",
                  versions: [
                     {
                        lessThan: "0.26.9",
                        status: "affected",
                        version: "0.0.1.alpha3",
                        versionType: "custom",
                     },
                     {
                        lessThan: "0.27.5",
                        status: "affected",
                        version: "0.27.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "2.0.9",
                        status: "affected",
                        version: "0.4.rc3",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-48220",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-21T15:23:30.053194Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-24T15:04:40.243Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:23:39.264Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp",
               },
               {
                  name: "https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34",
               },
               {
                  name: "https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454",
               },
               {
                  name: "https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098",
               },
               {
                  name: "https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134",
               },
               {
                  name: "https://github.com/decidim/decidim/releases/tag/v0.26.9",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/releases/tag/v0.26.9",
               },
               {
                  name: "https://github.com/decidim/decidim/releases/tag/v0.27.5",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/releases/tag/v0.27.5",
               },
               {
                  name: "https://github.com/decidim/decidim/releases/tag/v0.28.0",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/decidim/decidim/releases/tag/v0.28.0",
               },
               {
                  name: "https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "decidim",
               vendor: "decidim",
               versions: [
                  {
                     status: "affected",
                     version: ">= 0.0.1.alpha3, < 0.26.9",
                  },
                  {
                     status: "affected",
                     version: ">= 0.27.0, < 0.27.5",
                  },
                  {
                     status: "affected",
                     version: " >= 0.4.rc3, < 2.0.9",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Decidim is a participatory democracy framework. Starting in version 0.4.rc3 and prior to version 2.0.9 of the `devise_invitable` gem, the invites feature allows users to accept the invitation for an unlimited amount of time through the password reset functionality. This issue creates vulnerable dependencies starting in version 0.0.1.alpha3 and prior to versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems. When using the password reset functionality, the `devise_invitable` gem always accepts the pending invitation if the user has been invited. The only check done is if the user has been invited but the code does not ensure that the pending invitation is still valid as defined by the `invite_for` expiry period. Decidim sets this configuration to `2.weeks` so this configuration should be respected. The bug is in the `devise_invitable` gem and should be fixed there and the dependency should be upgraded in Decidim once the fix becomes available. `devise_invitable` to version `2.0.9` and above fix this issue. Versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems contain this fix. As a workaround, invitations can be cancelled directly from the database.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-672",
                     description: "CWE-672: Operation on a Resource after Expiration or Release",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-20T17:27:26.335Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp",
            },
            {
               name: "https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34",
            },
            {
               name: "https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454",
            },
            {
               name: "https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098",
            },
            {
               name: "https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134",
            },
            {
               name: "https://github.com/decidim/decidim/releases/tag/v0.26.9",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/releases/tag/v0.26.9",
            },
            {
               name: "https://github.com/decidim/decidim/releases/tag/v0.27.5",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/releases/tag/v0.27.5",
            },
            {
               name: "https://github.com/decidim/decidim/releases/tag/v0.28.0",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/decidim/decidim/releases/tag/v0.28.0",
            },
            {
               name: "https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198",
            },
         ],
         source: {
            advisory: "GHSA-w3q8-m492-4pwp",
            discovery: "UNKNOWN",
         },
         title: "Decidim's devise_invitable gem vulnerable to circumvention of invitation token expiry period",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2023-48220",
      datePublished: "2024-02-20T17:24:37.791Z",
      dateReserved: "2023-11-13T13:25:18.480Z",
      dateUpdated: "2025-04-24T15:04:40.243Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2023-48220\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-02-20T18:15:50.350\",\"lastModified\":\"2024-12-16T21:46:47.680\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Decidim is a participatory democracy framework. Starting in version 0.4.rc3 and prior to version 2.0.9 of the `devise_invitable` gem, the invites feature allows users to accept the invitation for an unlimited amount of time through the password reset functionality. This issue creates vulnerable dependencies starting in version 0.0.1.alpha3 and prior to versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems. When using the password reset functionality, the `devise_invitable` gem always accepts the pending invitation if the user has been invited. The only check done is if the user has been invited but the code does not ensure that the pending invitation is still valid as defined by the `invite_for` expiry period. Decidim sets this configuration to `2.weeks` so this configuration should be respected. The bug is in the `devise_invitable` gem and should be fixed there and the dependency should be upgraded in Decidim once the fix becomes available. `devise_invitable` to version `2.0.9` and above fix this issue. Versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems contain this fix. As a workaround, invitations can be cancelled directly from the database.\"},{\"lang\":\"es\",\"value\":\"Decidim es un framework de democracia participativa. A partir de la versión 0.4.rc3 y antes de la versión 2.0.9 de la gema `devise_invitable`, la función de invitaciones permite a los usuarios aceptar la invitación por un período de tiempo ilimitado a través de la función de restablecimiento de contraseña. Este problema crea dependencias vulnerables a partir de la versión 0.0.1.alpha3 y anteriores a las versiones 0.26.9, 0.27.5 y 0.28.0 de las gemas `decidim`, `decidim-admin` y `decidim-system`. Cuando se utiliza la función de restablecimiento de contraseña, la gema `devise_invitable` siempre acepta la invitación pendiente si el usuario ha sido invitado. La única verificación realizada es si el usuario ha sido invitado pero el código no garantiza que la invitación pendiente siga siendo válida según lo definido por el período de vencimiento de `invite_for`. Decidim establece esta configuración en `2.weeks` por lo que se debe respetar esta configuración. El error está en la gema `devise_invitable` y debería solucionarse allí y la dependencia debería actualizarse en Decidim una vez que la solución esté disponible. `devise_invitable` a la versión `2.0.9` y superiores solucionan este problema. Las versiones 0.26.9, 0.27.5 y 0.28.0 de las gemas `decidim`, `decidim-admin` y `decidim-system` contienen esta solución. Como workaround, las invitaciones se pueden cancelar directamente desde la base de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-672\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-672\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"0.0.2\",\"versionEndExcluding\":\"0.26.9\",\"matchCriteriaId\":\"6D1B1016-51D8-4E01-A074-A10CAEC25485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"0.27.0\",\"versionEndExcluding\":\"0.27.5\",\"matchCriteriaId\":\"38FDE900-4C89-45E3-821E-BF6F2A69C587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:-:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"DE4555F1-EB34-4472-931F-918D00E481F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha3:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"31A4E87B-87B1-40B3-B313-44570B5A77F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha4:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"F5AA544E-60FB-4D83-934D-FA82E2E51BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha5:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"D74508D4-F213-42D9-8E09-AE9FD6D08598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha6:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"01F34579-CCA4-4F22-AD26-27DD7B0586A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha7:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"7BBA5EB0-C175-4AAA-89CC-EC964C05A7A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha8:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"1BF30DCF-EC5F-4411-A124-69EB5A06AFCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:decidim:decidim:0.0.1:alpha9:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"A5DC0B15-23BF-4305-A018-1E56C1F32BB2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:scambra:devise_invitable:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"0.4.1\",\"versionEndExcluding\":\"2.0.9\",\"matchCriteriaId\":\"F9EB2E96-5C9B-4483-9185-76CEABC1C661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:scambra:devise_invitable:0.4.0:-:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"7DF8801D-7388-4480-BB49-18205160FA6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:scambra:devise_invitable:0.4.0:rc3:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"7A4594E1-64CB-4404-9C87-9759A657E18B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:scambra:devise_invitable:0.4.0:rc4:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"27BB4517-6C0E-4426-9EAC-D702AF00718E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:scambra:devise_invitable:0.4.0:rc5:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"D0D4559B-7949-4339-B7DD-BEA7EE98320B\"}]}]}],\"references\":[{\"url\":\"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.26.9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.27.5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.28.0\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.26.9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.27.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/releases/tag/v0.28.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\", \"name\": \"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\", \"name\": \"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\", \"name\": \"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\", \"name\": \"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\", \"name\": \"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.26.9\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.26.9\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.27.5\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.27.5\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.28.0\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.28.0\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\", \"name\": \"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T21:23:39.264Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-48220\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-21T15:23:30.053194Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:decidim:decidim:*:*:*:*:*:*:*:*\"], \"vendor\": \"decidim\", \"product\": \"decidim\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.0.1.alpha3\", \"lessThan\": \"0.26.9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0.27.0\", \"lessThan\": \"0.27.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0.4.rc3\", \"lessThan\": \"2.0.9\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-26T17:09:46.352Z\"}}], \"cna\": {\"title\": \"Decidim's devise_invitable gem vulnerable to circumvention of invitation token expiry period\", \"source\": {\"advisory\": \"GHSA-w3q8-m492-4pwp\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"decidim\", \"product\": \"decidim\", \"versions\": [{\"status\": \"affected\", \"version\": \">= 0.0.1.alpha3, < 0.26.9\"}, {\"status\": \"affected\", \"version\": \">= 0.27.0, < 0.27.5\"}, {\"status\": \"affected\", \"version\": \" >= 0.4.rc3, < 2.0.9\"}]}], \"references\": [{\"url\": \"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\", \"name\": \"https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\", \"name\": \"https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\", \"name\": \"https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\", \"name\": \"https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\", \"name\": \"https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.26.9\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.26.9\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.27.5\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.27.5\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/decidim/decidim/releases/tag/v0.28.0\", \"name\": \"https://github.com/decidim/decidim/releases/tag/v0.28.0\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\", \"name\": \"https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Decidim is a participatory democracy framework. Starting in version 0.4.rc3 and prior to version 2.0.9 of the `devise_invitable` gem, the invites feature allows users to accept the invitation for an unlimited amount of time through the password reset functionality. This issue creates vulnerable dependencies starting in version 0.0.1.alpha3 and prior to versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems. When using the password reset functionality, the `devise_invitable` gem always accepts the pending invitation if the user has been invited. The only check done is if the user has been invited but the code does not ensure that the pending invitation is still valid as defined by the `invite_for` expiry period. Decidim sets this configuration to `2.weeks` so this configuration should be respected. The bug is in the `devise_invitable` gem and should be fixed there and the dependency should be upgraded in Decidim once the fix becomes available. `devise_invitable` to version `2.0.9` and above fix this issue. Versions 0.26.9, 0.27.5, and 0.28.0 of the `decidim,` `decidim-admin`, and `decidim-system` gems contain this fix. As a workaround, invitations can be cancelled directly from the database.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-672\", \"description\": \"CWE-672: Operation on a Resource after Expiration or Release\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-02-20T17:27:26.335Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2023-48220\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-24T15:04:40.243Z\", \"dateReserved\": \"2023-11-13T13:25:18.480Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-02-20T17:24:37.791Z\", \"assignerShortName\": \"GitHub_M\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.