Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rfq3-w54c-f9q5

Опубликовано: 24 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses

Impact

fosite#400 (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces (rfc8252#section-7.3). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters

  1. Registering a client with allowed redirect URL http://127.0.0.1/callback
  2. Performing OAuth2 flow and requesting redirect URL http://127.0.0.1/callback?bar=foo
  3. Instead of an error, the browser is redirected to http://127.0.0.1/callback?bar=foo with a potentially successful OAuth2 response.

as well as the host parameter (as long as the host is a loopback interface):

  1. Registering a client with allowed redirect URL https://example.com/callback
  2. Performing OAuth2 flow and requesting redirect URL http://127.0.0.1/callback
  3. Instead of an error, the browser is redirected to http://127.0.0.1/callback with a potentially successful OAuth2 response.

These bugs are only applicable in scenarios where the attacker has control over the loopback interface (localhost, 127.0.0.1, [::1]) where the browser performing the OAuth2 flow is running.

Пакеты

Наименование

github.com/ory/fosite

go
Затронутые версииВерсия исправления

>= 0.30.3, < 0.34.1

0.34.1

EPSS

Процентиль: 48%
0.00255
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-20
CWE-601

Связанные уязвимости

CVSS3: 6.1
nvd
больше 5 лет назад

ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.

EPSS

Процентиль: 48%
0.00255
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-20
CWE-601