Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade signalk-server to version 2.24.0 or higher.
signalk-server is an An implementation of a Signal K server for boats.
Affected versions of this package are vulnerable to Origin Validation Error via the construction of the redirectUri and fullPostLogoutUri using an unvalidated Host header in the OIDC authentication and logout processes. An attacker can intercept OAuth authorization codes and hijack user sessions by injecting a malicious Host header, causing the OIDC provider to redirect sensitive tokens to an attacker-controlled domain.
Note:
This is only exploitable if the redirectUri is not explicitly set in the configuration and the reverse proxy is configured to forward the client-supplied Host header, as recommended in the official documentation.