Open Redirect Affecting github.com/ory/fosite Open this link in a new tab package, versions >=0.30.3 <0.34.1


0.0
medium
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    Low

  • Privileges Required

    High

  • User Interaction

    Required

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMORYFOSITE-1015593

  • published

    4 Oct 2020

  • disclosed

    4 Oct 2020

  • credit

    aeneasr, Mitar

How to fix?

Upgrade github.com/ory/fosite to version 0.34.1 or higher.

Overview

github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.

Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.

References