Описание
In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern ("[a-zA-Z][a-zA-Z0-9+.-]+:") before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.1 (включая)
cpe:2.3:a:oauth2-server_project:oauth2-server:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 59%
0.00386
Низкий
7.2 High
CVSS3
Дефекты
CWE-601
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
oauth2-server through 3.1.1 vulnerable to Open Redirect
EPSS
Процентиль: 59%
0.00386
Низкий
7.2 High
CVSS3
Дефекты
CWE-601