The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
References
Link | Resource |
---|---|
https://github.com/bitly/oauth2_proxy/pull/359 | Patch Third Party Advisory |
https://tools.ietf.org/html/rfc6819#section-5.2.3.5 | Technical Description |
https://github.com/bitly/oauth2_proxy/pull/359 | Patch Third Party Advisory |
https://tools.ietf.org/html/rfc6819#section-5.2.3.5 | Technical Description |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bitly/oauth2_proxy/pull/359 - Patch, Third Party Advisory | |
References | () https://tools.ietf.org/html/rfc6819#section-5.2.3.5 - Technical Description |
Information
Published : 2017-07-17 13:18
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000070
Mitre link : CVE-2017-1000070
CVE.ORG link : CVE-2017-1000070
JSON object : View
Products Affected
oauth2_proxy_project
- oauth2_proxy
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')