Open Redirect Affecting github.com/ory/fosite package, versions >=0.30.3 <0.34.1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMORYFOSITE-1015593
- published 4 Oct 2020
- disclosed 4 Oct 2020
- credit aeneasr, Mitar
Introduced: 4 Oct 2020
CVE-2020-15233 Open this link in a new tabHow to fix?
Upgrade github.com/ory/fosite
to version 0.34.1 or higher.
Overview
github.com/ory/fosite is an OAuth2 & OpenID Connect framework for Go.
Affected versions of this package are vulnerable to Open Redirect. An attacker can override the registered redirect URL by performing an OAuth flow and requesting direct URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface.