Описание
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy
Impact
What kind of vulnerability is it? Who is impacted? For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect.
For example, if a whitelist domain was configured for .example.com, the intention is that subdomains of example.com are allowed.
Instead, example.com and badexample.com could also match.
Patches
Has the problem been patched? What versions should users upgrade to? This is fixed in version 7.0.0 onwards.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading? Disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.
Original Issue Posted by @semoac:
Whitelist Domain feature is not working as expected because is not matching a dot to ensure the redirect is a subdomain.
Expected Behavior
If whitelist domain is set to .example.com , then hack.alienexample.com should be rejected as a valid redirect.
Current Behavior
The code is removing the dot from .example.com and only checking if the redirect string end with example.com
Possible Solution
Include the dot when checking the string:
Steps to Reproduce (for bugs)
Users of github.com/oauth2-proxy/oauth2-proxy are advised to update to github.com/oauth2-proxy/oauth2-proxy/v7
Ссылки
- https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-4mf2-f3wh-gvf2
- https://nvd.nist.gov/vuln/detail/CVE-2021-21291
- https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725
- https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0
- https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7
Пакеты
github.com/oauth2-proxy/oauth2-proxy/v7
< 7.0.0
7.0.0
github.com/oauth2-proxy/oauth2-proxy
<= 3.2.0
Отсутствует
Связанные уязвимости
OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are allowed. Instead, "example.com" and "badexample.com" could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.
OAuth2 Proxy is an open-source reverse proxy and static file server th ...