Open Redirect Affecting github.com/ory/fosite package, versions >=0.30.3 <0.34.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.26% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMORYFOSITE-1015593
  • published4 Oct 2020
  • disclosed4 Oct 2020
  • creditaeneasr, Mitar

Introduced: 4 Oct 2020

CVE-2020-15233  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade github.com/ory/fosite to version 0.34.1 or higher.

Overview

github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.

Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.

References

CVSS Base Scores

version 3.1