-
Notifications
You must be signed in to change notification settings - Fork 577
fix: allow all URL forms in redirects #711
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
There was some discussion here on this issue: #99 This does open up the space to introduce a wider attack surface for mobile apps, although this is not as significant as it appears. On Android at least, apps can also listen to |
d49dbcc to
1316be2
Compare
1316be2 to
4a691df
Compare
|
Added to Security doc (yet unpublished). Excerpt: Redirect URLsSupabase Auth lets you redirect back to different URLs on susccessful Given that in sophisticated attacks this parameter may come from a malicious The allow list can be a simple list of exactly matching URLs, but it also :::tip Because wildcard patterns are also supported, you need to be careful when using Dont's.
Dos.
:::tip |
|
🎉 This PR is included in version 2.17.1 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
GoTrue limited wildcard redirect patterns only on
httporhttpsURLs. This presents a problem in mobile apps that have dynamic redirects back to their application.See: #710.