CVE-2024-27090 – Decidim vulnerable to data disclosure through the embed feature
https://notcve.org/view.php?id=CVE-2024-27090
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. If an attacker can infer the slug or URL of an unpublished or private resource, and this resource can be embbeded (such as a Participatory Process, an Assembly, a Proposal, a Result, etc), then some data of this resource could be accessed. This vulnerability is fixed in 0.27.6. Decidim es un framework de democracia participativa, escrito en Ruby on Rails, desarrollado originalmente para el sitio web de participación en línea y fuera de línea del gobierno de la ciudad de Barcelona. Si un atacante puede inferir el slug o la URL de un recurso privado o no publicado, y este recurso puede estar incrustado (como un proceso participativo, una asamblea, una propuesta, un resultado, etc.), entonces se podría acceder a algunos datos de este recurso. . • https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705 https://github.com/decidim/decidim/pull/12528 https://github.com/decidim/decidim/releases/tag/v0.27.6 https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-47635 – Decidim vulnerable to possible CSRF attack at questionnaire templates preview
https://notcve.org/view.php?id=CVE-2023-47635
Decidim is a participatory democracy framework. Starting in version 0.23.0 and prior to versions 0.27.5 and 0.28.0, the CSRF authenticity token check is disabled for the questionnaire templates preview. The issue does not imply a serious security thread as you need to have access also to the session cookie in order to see this resource. This URL does not allow modifying the resource but it may allow attackers to gain access to information which was not meant to be public. The issue is fixed in version 0.27.5 and 0.28.0. • https://github.com/decidim/decidim/blob/3187bdfd40ea1c57c2c12512b09a7fec0b2bed08/decidim-templates/app/controllers/decidim/templates/admin/questionnaire_templates_controller.rb#L11 https://github.com/decidim/decidim/commit/5542227be66e3b6d7530f5b536069bce09376660 https://github.com/decidim/decidim/commit/57a4b467787448307b5d9b01ce6e2c8502e121ac https://github.com/decidim/decidim/pull/11743 https://github.com/decidim/decidim/pull/6247 https://github.com/decidim/decidim/releases/tag/v0.27.5 https://github.com/decidim/decidim/releases/tag& • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2023-47634 – Decidim has race condition in Endorsements
https://notcve.org/view.php?id=CVE-2023-47634
Decidim is a participatory democracy framework. Starting in version 0.10.0 and prior to versions 0.26.9, 0.27.5, and 0.28.0, a race condition in the endorsement of resources (for instance, a proposal) allows a user to make more than once endorsement. To exploit this vulnerability, the request to set an endorsement must be sent several times in parallel. Versions 0.26.9, 0.27.5, and 0.28.0 contain a patch for this issue. As a workaround, disable the Endorsement feature in the components. • https://github.com/decidim/decidim/releases/tag/v0.26.9 https://github.com/decidim/decidim/releases/tag/v0.27.5 https://github.com/decidim/decidim/releases/tag/v0.28.0 https://github.com/decidim/decidim/security/advisories/GHSA-r275-j57c-7mf2 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2023-36465 – Decidim has broken access control in templates
https://notcve.org/view.php?id=CVE-2023-36465
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The `templates` module doesn't enforce the correct permissions, allowing any logged-in user to access to this functionality in the administration panel. An attacker could use this vulnerability to change, create or delete templates of surveys. This issue has been patched in version 0.26.8 and 0.27.4. Decidim es un framework de democracia participativa, escrito en Ruby on Rails, desarrollado originalmente para el sitio web de participación en línea y fuera de línea del gobierno de la ciudad de Barcelona. • https://github.com/decidim/decidim/releases/tag/v0.26.8 https://github.com/decidim/decidim/releases/tag/v0.27.4 https://github.com/decidim/decidim/security/advisories/GHSA-639h-86hw-qcjq • CWE-284: Improper Access Control CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2023-34089 – Decidim Cross-site Scripting vulnerability in the processes filter
https://notcve.org/view.php?id=CVE-2023-34089
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The processes filter feature is susceptible to Cross-site scripting. This allows a remote attacker to execute JavaScript code in the context of a currently logged-in user. An attacker could use this vulnerability to make other users endorse or support proposals they have no intention of supporting or endorsing. The problem was patched in version 0.27.3 and 0.26.7. • https://github.com/decidim/decidim/releases/tag/v0.26.6 https://github.com/decidim/decidim/releases/tag/v0.27.3 https://github.com/decidim/decidim/security/advisories/GHSA-5652-92r9-3fx9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •