GHSA-grfp-q2mm-hfp6

Suggest an improvement
Source
https://github.com/advisories/GHSA-grfp-q2mm-hfp6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-grfp-q2mm-hfp6/GHSA-grfp-q2mm-hfp6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-grfp-q2mm-hfp6
Aliases
Related
Published
2021-05-24T17:00:05Z
Modified
2023-11-01T04:52:01.550032Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Redirect URL matching ignores character casing
Details

Impact

Before version v0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match:

  1. Registering a client with allowed redirect URL https://example.com/callback
  2. Performing OAuth2 flow and requesting redirect URL https://example.com/CALLBACK
  3. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example).
Database specific
{
    "nvd_published_at": "2020-10-02T21:15:00Z",
    "github_reviewed_at": "2021-05-21T22:15:37Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-178",
        "CWE-20",
        "CWE-601"
    ]
}
References

Affected packages

Go / github.com/ory/fosite

Package

Name
github.com/ory/fosite
View open source insights on deps.dev
Purl
pkg:golang/github.com/ory/fosite

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.34.1