Skip to content

Open Redirect in oauth2_proxy

Moderate severity GitHub Reviewed Published Dec 20, 2021 to the GitHub Advisory Database • Updated Sep 27, 2023

Package

gomod github.com/bitly/oauth2_proxy (Go)

Affected versions

< 2.2.0

Patched versions

2.2.0

Description

The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819

References

Reviewed May 19, 2021
Published to the GitHub Advisory Database Dec 20, 2021
Last updated Sep 27, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2017-1000070

GHSA ID

GHSA-jm34-xm8m-w958

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.