logo

CVE-2020-15233 github.com/ory/fosite

Package

Manager: go
Name: github.com/ory/fosite
Vulnerable Version: >=0.30.3 <0.34.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00255 pctl0.48657

Details

OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses ### Impact [fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters 1. Registering a client with allowed redirect URL `http://127.0.0.1/callback` 2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback?bar=foo` 3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback?bar=foo` with a potentially successful OAuth2 response. as well as the host parameter (as long as the host is a loopback interface): 1. Registering a client with allowed redirect URL `https://example.com/callback` 2. Performing OAuth2 flow and requesting redirect URL `http://127.0.0.1/callback` 3. Instead of an error, the browser is redirected to `http://127.0.0.1/callback` with a potentially successful OAuth2 response. These bugs are only applicable in scenarios where the attacker has control over the loopback interface (`localhost`, `127.0.0.1`, `[::1]`) where the browser performing the OAuth2 flow is running.

Metadata

Created: 2021-05-24T17:00:12Z
Modified: 2021-11-19T14:42:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-rfq3-w54c-f9q5/GHSA-rfq3-w54c-f9q5.json
CWE IDs: ["CWE-20", "CWE-601"]
Alternative ID: GHSA-rfq3-w54c-f9q5
Finding: F156
Auto approve: 1