Open Redirect Affecting github.com/ory/fosite Open this link in a new tab package, versions >=0.30.3 <0.34.1
Exploit Maturity
Proof of concept
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Confidentiality
High
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMORYFOSITE-1015593
-
published
4 Oct 2020
-
disclosed
4 Oct 2020
-
credit
aeneasr, Mitar
Introduced: 4 Oct 2020
CVE-2020-15233 Open this link in a new tabHow to fix?
Upgrade github.com/ory/fosite
to version 0.34.1 or higher.
Overview
github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.
Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.