Critical severity9.1NVD Advisory· Published Jan 23, 2017· Updated May 13, 2026
CVE-2016-6582
CVE-2016-6582
Description
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
doorkeeperRubyGems | < 4.2.0 | 4.2.0 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- seclists.org/fulldisclosure/2016/Aug/105nvdMailing ListPatchThird Party AdvisoryWEB
- github.com/doorkeeper-gem/doorkeeper/issues/875nvdIssue TrackingPatchThird Party AdvisoryWEB
- github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0nvdIssue TrackingPatchRelease NotesThird Party AdvisoryWEB
- packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.htmlnvdThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/bid/92551nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-3m6r-39p3-jq25ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-6582ghsaADVISORY
- www.openwall.com/lists/oss-security/2016/08/19/2ghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2016-6582.ymlghsaWEB
- web.archive.org/web/20170214021758/http://www.securityfocus.com/bid/92551ghsaWEB
- web.archive.org/web/20201207202519/http://www.securityfocus.com/archive/1/539268/100/0/threadedghsaWEB
- www.securityfocus.com/archive/1/539268/100/0/threadednvd
News mentions
0No linked articles in our index yet.