GHSA-5m6c-jp6f-2vcv

Suggest an improvement
Source
https://github.com/advisories/GHSA-5m6c-jp6f-2vcv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-5m6c-jp6f-2vcv/GHSA-5m6c-jp6f-2vcv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5m6c-jp6f-2vcv
Aliases
Related
Published
2021-12-20T17:58:59Z
Modified
2023-12-06T01:00:35.221226Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Open Redirect in OAuth2 Proxy
Details

Impact

As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2021-05-24T20:58:18Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

Go / github.com/oauth2-proxy/oauth2-proxy

Package

Name
github.com/oauth2-proxy/oauth2-proxy
View open source insights on deps.dev
Purl
pkg:golang/github.com/oauth2-proxy/oauth2-proxy

Affected ranges

Type
SEMVER
Events
Introduced
5.1.1
Fixed
6.0.0