Skip to content

Server Side Request Forgery (SSRF) in org.mitre:openid-connect-server

High severity GitHub Reviewed Published May 13, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

maven org.mitre:openid-connect-server (Maven)

Affected versions

<= 1.3.3

Patched versions

None

Description

The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.

References

Published by the National Vulnerability Database Mar 25, 2021
Reviewed Mar 26, 2021
Published to the GitHub Advisory Database May 13, 2021
Last updated Feb 1, 2023

Severity

High

Weaknesses

CVE ID

CVE-2021-26715

GHSA ID

GHSA-792r-mh2q-p8qp

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.