Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g2wh-gmwq-2gmc

Опубликовано: 21 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 3.4

Описание

Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."

Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."

EPSS

Процентиль: 13%
0.00042
Низкий

3.4 Low

CVSS3

Дефекты

CWE-647

Связанные уязвимости

CVSS3: 3.4
nvd
10 месяцев назад

Sonos api.sonos.com through 2025-04-21, when the /login/v3/oauth endpoint is used, accepts a redirect_uri containing userinfo in the authority component, which is not consistent with RFC 6819 section 5.2.3.5. An authorization code may be sent to an attacker-controlled destination. This might have further implications in conjunction with "Decompiling the app revealed a hardcoded secret."

EPSS

Процентиль: 13%
0.00042
Низкий

3.4 Low

CVSS3

Дефекты

CWE-647