From f134e7d43f8dfbf0f70196e74b0d3724b1bfae7b Mon Sep 17 00:00:00 2001 From: "pinkforest(she/her)" <36498018+pinkforest@users.noreply.github.com> Date: Thu, 2 Feb 2023 22:43:19 +1100 Subject: [PATCH] Add slack-morphism CVE-2022-31162 (#1556) --- crates/slack-morphism/RUSTSEC-0000-0000.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 crates/slack-morphism/RUSTSEC-0000-0000.md diff --git a/crates/slack-morphism/RUSTSEC-0000-0000.md b/crates/slack-morphism/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..fef83aa --- /dev/null +++ b/crates/slack-morphism/RUSTSEC-0000-0000.md @@ -0,0 +1,17 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "slack-morphism" +date = "2022-07-22" +url = "https://github.com/abdolence/slack-morphism-rust/pull/133" +aliases = ["CVE-2022-31162", "GHSA-99j7-mhfh-w84p"] +cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + +[versions] +patched = [">= 0.41.0"] +``` +# Slack OAuth Secrets leak in debug logs + +Debug log formatting made it possible to leak OAuth secrets into debug logs. + +The patched version has introduced more strict checks to avoid this.