Vulnerabilities > CVE-2020-15223 - Improper Check for Unusual or Exceptional Conditions vulnerability in ORY Fosite
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
NONE Summary
In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.34.0, the `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. This is fixed in version 0.34.0
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
- https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
- https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm
- https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm
- https://tools.ietf.org/html/rfc7009#section-2.2.1
- https://tools.ietf.org/html/rfc7009#section-2.2.1