Lucene search

K
cveGitHub_MCVE-2020-15234
HistoryOct 02, 2020 - 9:15 p.m.

CVE-2020-15234

2020-10-0221:15:12
CWE-601
CWE-20
CWE-178
GitHub_M
web.nvd.nist.gov
42
ory fosite
oauth2
openid connect
security
vulnerability
patch
cve-2020-15234

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.4%

ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client’s registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1.

Affected configurations

Nvd
Vulners
Node
oryfositeRange<0.34.1
VendorProductVersionCPE
oryfosite*cpe:2.3:a:ory:fosite:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "fosite",
    "vendor": "ory",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.34.1"
      }
    ]
  }
]

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

5.1

Confidence

High

EPSS

0.001

Percentile

19.4%

Related for CVE-2020-15234