Open Redirect

Affecting github.com/ory/fosite package, versions >=0.30.3 <0.34.1

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.

Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.

Remediation

Upgrade github.com/ory/fosite to version 0.34.1 or higher.

References

CVSS Score

6.1
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    High
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    None
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
Credit
aeneasr, Mitar
CVE
CVE-2020-15233
CWE
CWE-601
Snyk ID
SNYK-GOLANG-GITHUBCOMORYFOSITE-1015593
Disclosed
04 Oct, 2020
Published
04 Oct, 2020