GHSA-4rg6-fm25-gc34

Suggest an improvement
Source
https://github.com/advisories/GHSA-4rg6-fm25-gc34
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-4rg6-fm25-gc34/GHSA-4rg6-fm25-gc34.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4rg6-fm25-gc34
Aliases
Published
2022-08-30T00:00:26Z
Modified
2023-11-08T04:03:20.585885Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
oauth2-server through 3.1.1 vulnerable to Open Redirect
Details

In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern ([a-zA-Z][a-zA-Z0-9+.-]+:) before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.

Database specific
{
    "cwe_ids": [
        "CWE-601"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2022-09-16T19:36:13Z",
    "github_reviewed": true,
    "nvd_published_at": "2022-08-29T21:15:00Z"
}
References

Affected packages

npm / oauth2-server

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.1.1