Skip to main content

Missing Authorization


Severity High
Score 7.5/10


Doorkeeper version 5.0.0 prior 5.0.3, 5.1.0 prior to 5.1.1, 5.2.0 prior to 5.2.5, and 5.3.0 prior to 5.3.2 contains an information disclosure vulnerability that allows an attacker to retrieve the client secret only intended for the OAuth application owner. After authorizing the application and allowing access, the attacker simply needs to request the list of their authorized applications in a JSON format (usually GET /oauth/authorized_applications.json). An application is vulnerable if the authorized application controller is enabled.

  • LOW
  • NONE
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-862 - Missing Authorization

The missing authorization vulnerability occurs when a software program allows users to access privileged parts of the program without verifying the user credentials. Impact of such a vulnerability depends on the resources employed by the software, ranging from account takeover to sensitive information exposure, denial of service, and complete system takeover.

Advisory Timeline

  • Published