GMS-2023-1836: Tokenizer vulnerable to client brute-force of token secrets
Impact
Authorized clients, having an inject_processor
secret, could brute-force the secret token value by abusing the fmt
parameter to the Proxy-Tokenizer
header.
Patches
This was fixed in https://github.com/superfly/tokenizer/pull/8 and further mitigated in https://github.com/superfly/tokenizer/pull/9.
References
Detect and mitigate GMS-2023-1836 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →