Open Redirect Affecting github.com/ory/fosite package, versions >=0.30.3 <0.34.1


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    User Interaction Required
    Confidentiality High
    Integrity High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.05% (18th percentile)
Expand this section
NVD
4.8 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMORYFOSITE-1015593
  • published 4 Oct 2020
  • disclosed 4 Oct 2020
  • credit aeneasr, Mitar

How to fix?

Upgrade github.com/ory/fosite to version 0.34.1 or higher.

Overview

github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.

Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.

References