Open Redirect Affecting doorkeeper-openid_connect package, versions <1.5.4
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
0.09% (38th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-DOORKEEPEROPENIDCONNECT-173976
- published 18 Mar 2019
- disclosed 18 Mar 2019
- credit meagar
Introduced: 18 Mar 2019
CVE-2019-9837 Open this link in a new tabHow to fix?
Upgrade doorkeeper-openid_connect
to version 1.5.4 or higher.
Overview
doorkeeper-openid_connect is an OpenID Connect extension for Doorkeeper.
Affected versions of this package are vulnerable to Open Redirect
via the redirect_uri
field in an OAuth authorization request (that results in an error response) with the openid
scope and a prompt=none
value. This allows for phishing attacks against the authorization flow.