Lucene search

K
rubygemsRubySecRUBY:DOORKEEPER-OPENID_CONNECT-2019-9837
HistoryMar 24, 2019 - 9:00 p.m.

Doorkeeper::OpenidConnect Open Redirect

2019-03-2421:00:00
RubySec
github.com
9

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper)
1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in
an OAuth authorization request (that results in an error response) with the ‘openid’
scope and a prompt=none value. This allows phishing attacks against the authorization
flow.

Affected configurations

Vulners
Node
rubydoorkeeper-openid_connectRange1.5.4
VendorProductVersionCPE
rubydoorkeeper-openid_connect*cpe:2.3:a:ruby:doorkeeper-openid_connect:*:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Related for RUBY:DOORKEEPER-OPENID_CONNECT-2019-9837