CVE-2020-26938: URL Redirection to Untrusted Site ('Open Redirect')
(updated )
In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern ("[a-zA-Z][a-zA-Z0-9+.-]+:") before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.
References
- github.com/advisories/GHSA-4rg6-fm25-gc34
- github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/grant-types/authorization-code-grant-type.js
- github.com/oauthjs/node-oauth2-server/blob/91d2cbe70a0eddc53d72def96864e2de0fd41703/lib/validator/is.js
- github.com/oauthjs/node-oauth2-server/issues/637
- nvd.nist.gov/vuln/detail/CVE-2020-26938
- tools.ietf.org/html/rfc3986
- tools.ietf.org/html/rfc6749
Detect and mitigate CVE-2020-26938 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →