Package: release.debian.org
Severity: normal
Tags: bookworm
User: release.debian....@packages.debian.org
Usertags: pu
X-Debbugs-Cc: secur...@debian.org, Debian Ruby Team 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>

  * CVE-2023-34246: Improper Authentication (Closes: #1038950)
diffstat for ruby-doorkeeper-5.5.0 ruby-doorkeeper-5.5.0

 changelog                                                            |    7 ++
 patches/0001-Block-public-clients-automatic-authorization-skip.patch |   31 
++++++++++
 patches/series                                                       |    1 
 3 files changed, 39 insertions(+)

diff -Nru ruby-doorkeeper-5.5.0/debian/changelog 
ruby-doorkeeper-5.5.0/debian/changelog
--- ruby-doorkeeper-5.5.0/debian/changelog      2021-08-27 14:15:52.000000000 
+0300
+++ ruby-doorkeeper-5.5.0/debian/changelog      2024-12-08 23:42:11.000000000 
+0200
@@ -1,3 +1,10 @@
+ruby-doorkeeper (5.5.0-2+deb12u1) bookworm; urgency=medium
+
+  * Non-maintainer upload.
+  * CVE-2023-34246: Improper Authentication (Closes: #1038950)
+
+ -- Adrian Bunk <b...@debian.org>  Sun, 08 Dec 2024 23:42:11 +0200
+
 ruby-doorkeeper (5.5.0-2) unstable; urgency=medium
 
   [ Debian Janitor ]
diff -Nru 
ruby-doorkeeper-5.5.0/debian/patches/0001-Block-public-clients-automatic-authorization-skip.patch
 
ruby-doorkeeper-5.5.0/debian/patches/0001-Block-public-clients-automatic-authorization-skip.patch
--- 
ruby-doorkeeper-5.5.0/debian/patches/0001-Block-public-clients-automatic-authorization-skip.patch
   1970-01-01 02:00:00.000000000 +0200
+++ 
ruby-doorkeeper-5.5.0/debian/patches/0001-Block-public-clients-automatic-authorization-skip.patch
   2024-12-08 23:41:54.000000000 +0200
@@ -0,0 +1,31 @@
+From 992ead90a17e368129bed6750da2f90e9e720e80 Mon Sep 17 00:00:00 2001
+From: Adam Heath <a...@polleverywhere.com>
+Date: Fri, 17 Mar 2023 16:41:30 +0800
+Subject: Block public clients automatic authorization skip
+
+Non-confidential applications should not be able to skip the authorization 
stop, even if they have an existing matching_token.
+
+From the [issue](https://github.com/doorkeeper-gem/doorkeeper/issues/1589):
+> According to RFC 8252 section 8.6, the authentication server should 
re-prompt for user consent, since the client's identity cannot be assured 
simply from the client_id parameter
+
+Fixes https://github.com/doorkeeper-gem/doorkeeper/issues/1589
+---
+ app/controllers/doorkeeper/authorizations_controller.rb | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/app/controllers/doorkeeper/authorizations_controller.rb 
b/app/controllers/doorkeeper/authorizations_controller.rb
+index 71dce31c..81445875 100644
+--- a/app/controllers/doorkeeper/authorizations_controller.rb
++++ b/app/controllers/doorkeeper/authorizations_controller.rb
+@@ -23,7 +23,7 @@ module Doorkeeper
+     private
+ 
+     def render_success
+-      if skip_authorization? || matching_token?
++      if skip_authorization? || (matching_token? && 
pre_auth.client.application.confidential?)
+         redirect_or_render authorize_response
+       elsif Doorkeeper.configuration.api_only
+         render json: pre_auth
+-- 
+2.30.2
+
diff -Nru ruby-doorkeeper-5.5.0/debian/patches/series 
ruby-doorkeeper-5.5.0/debian/patches/series
--- ruby-doorkeeper-5.5.0/debian/patches/series 1970-01-01 02:00:00.000000000 
+0200
+++ ruby-doorkeeper-5.5.0/debian/patches/series 2024-12-08 23:42:10.000000000 
+0200
@@ -0,0 +1 @@
+0001-Block-public-clients-automatic-authorization-skip.patch

Reply via email to