fosite#400 (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces (rfc8252#section-7.3). As part of that change new behavior was introduced which failed to respect the redirect URL's (only for loopback interfaces!) query parameters
http://127.0.0.1/callbackhttp://127.0.0.1/callback?bar=foohttp://127.0.0.1/callback?bar=foo with a potentially successful OAuth2 response.as well as the host parameter (as long as the host is a loopback interface):
https://example.com/callbackhttp://127.0.0.1/callbackhttp://127.0.0.1/callback with a potentially successful OAuth2 response.These bugs are only applicable in scenarios where the attacker has control over the loopback interface (localhost, 127.0.0.1, [::1]) where the browser performing the OAuth2 flow is running.
{
"nvd_published_at": "2020-10-02T21:15:00Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-20",
"CWE-601"
],
"github_reviewed_at": "2021-05-21T22:14:38Z",
"github_reviewed": true
}