Headline
CVE-2023-39438: Missing Authorization check allows certain operations on CLA Assistant data
A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.
Impact
A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant.
The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.
We urge everyone self-hosting CLA-Assistant to update immediately.
Impact on cla-assistant.io
The hosted instance of cla-assistant.io got patched on the 2023-07-28 at 07:15 UTC. Before that, this same bug could have been exploited on cla-assistant.io.
Patches
This problem has been patched in release v2.13.1.
Workarounds
There is no workaround available.
Acknowledgements
Big thanks to @darmiel for finding and creating a patch for this during his work on cla-assistant.