diff --git a/advisories/unreviewed/2023/04/GHSA-wr5g-q49g-548w/GHSA-wr5g-q49g-548w.json b/advisories/unreviewed/2023/04/GHSA-wr5g-q49g-548w/GHSA-wr5g-q49g-548w.json index d587a5bb298bd..cd5046922190e 100644 --- a/advisories/unreviewed/2023/04/GHSA-wr5g-q49g-548w/GHSA-wr5g-q49g-548w.json +++ b/advisories/unreviewed/2023/04/GHSA-wr5g-q49g-548w/GHSA-wr5g-q49g-548w.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-wr5g-q49g-548w", - "modified": "2024-04-04T03:38:59Z", + "modified": "2024-04-04T03:39:01Z", "published": "2023-04-24T06:31:20Z", "aliases": [ "CVE-2023-28131" ], + "summary": "Expo SDK (45,46,47) Oauth flaw", "details": "A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the \"Expo AuthSession Redirect Proxy\" for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc).", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "expo" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "48.0.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",