Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqvh-63mv-9w92

Опубликовано: 12 мар. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

@backstage/plugin-auth-backend: OAuth redirect URI allowlist bypass

Impact

The experimental OIDC provider in @backstage/plugin-auth-backend is vulnerable to a redirect URI allowlist bypass. Instances that have enabled experimental Dynamic Client Registration or Client ID Metadata Documents and configured allowedRedirectUriPatterns are affected.

A specially crafted redirect URI can pass the allowlist validation while resolving to an attacker-controlled host. If a victim approves the resulting OAuth consent request, their authorization code is sent to the attacker, who can exchange it for a valid access token.

This requires victim interaction and that one of the experimental features is explicitly enabled, which is not the default.

Patches

Upgrade to @backstage/plugin-auth-backend version 0.27.1 or later.

Workarounds

Disable experimental Dynamic Client Registration and Client ID Metadata Documents features if they are not required.

References

Пакеты

Наименование

@backstage/plugin-auth-backend

npm
Затронутые версииВерсия исправления

< 0.27.1

0.27.1

EPSS

Процентиль: 9%
0.00033
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-20
CWE-601

Связанные уязвимости

CVSS3: 5.9
redhat
15 дней назад

An allowlist bypass flaw has been discovered in the npm @backstage/plugin-auth-backend package. Instances that have enabled experimental Dynamic Client Registration or Client ID Metadata Documents and configured allowedRedirectUriPatterns are affected. A specially crafted redirect URI can pass the allowlist validation while resolving to an attacker-controlled host. If a victim approves the resulting OAuth consent request, their authorization code is sent to the attacker, who can exchange it for a valid access token. This requires victim interaction and that one of the experimental features is explicitly enabled, which is not the default.

CVSS3: 5.9
nvd
15 дней назад

Backstage is an open framework for building developer portals. Prior to 0.27.1, the experimental OIDC provider in @backstage/plugin-auth-backend is vulnerable to a redirect URI allowlist bypass. Instances that have enabled experimental Dynamic Client Registration or Client ID Metadata Documents and configured allowedRedirectUriPatterns are affected. A specially crafted redirect URI can pass the allowlist validation while resolving to an attacker-controlled host. If a victim approves the resulting OAuth consent request, their authorization code is sent to the attacker, who can exchange it for a valid access token. This requires victim interaction and that one of the experimental features is explicitly enabled, which is not the default. This vulnerability is fixed in 0.27.1.

EPSS

Процентиль: 9%
0.00033
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-20
CWE-601