Open Redirect Affecting doorkeeper-openid_connect package, versions <1.5.4


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required

    Threat Intelligence

    EPSS 0.09% (38th percentile)
Expand this section
NVD
6.1 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-DOORKEEPEROPENIDCONNECT-173976
  • published 18 Mar 2019
  • disclosed 18 Mar 2019
  • credit meagar

How to fix?

Upgrade doorkeeper-openid_connect to version 1.5.4 or higher.

Overview

doorkeeper-openid_connect is an OpenID Connect extension for Doorkeeper.

Affected versions of this package are vulnerable to Open Redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the openid scope and a prompt=none value. This allows for phishing attacks against the authorization flow.