Open Redirect to an Untrusted Site Affecting github.com/oauth2-proxy/oauth2-proxy package, versions <5.1.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect to an Untrusted Site vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMOAUTH2PROXYOAUTH2PROXY-568686
  • published7 May 2020
  • disclosed7 May 2020
  • creditUnknown

Introduced: 7 May 2020

CVE-2020-11053  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade github.com/oauth2-proxy/oauth2-proxy to version 5.1.1 or higher.

Overview

github.com/oauth2-proxy/oauth2-proxy is a reverse proxy that provides authentication with Google, Github or other providers.

Affected versions of this package are vulnerable to Open Redirect to an Untrusted Site. Users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites. However, by crafting a redirect URL with HTML encoded whitespace characters the validation could be bypassed and allow a redirect to any URL provided.

CVSS Scores

version 3.1