In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern ("[a-zA-Z][a-zA-Z0-9+.-]+:") before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.
References
Configurations
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/grant-types/authorization-code-grant-type.js#L143 - Exploit, Third Party Advisory | |
References | () https://github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/validator/is.js#L12 - Exploit, Third Party Advisory | |
References | () https://github.com/oauthjs/node-oauth2-server/issues/637 - Issue Tracking, Third Party Advisory | |
References | () https://tools.ietf.org/html/rfc3986#section-3 - Third Party Advisory | |
References | () https://tools.ietf.org/html/rfc6749#section-3.1.2 - Third Party Advisory |
Information
Published : 2022-08-29 21:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26938
Mitre link : CVE-2020-26938
CVE.ORG link : CVE-2020-26938
JSON object : View
Products Affected
oauth2-server_project
- oauth2-server
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')