CVE-2021-21291Open Redirect in Oauth2-proxy

CWE-601Open Redirect4 documents3 sources
Severity
6.1MEDIUMNVD
EPSS
0.2%
top 52.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateAug 21

Description

OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are al

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Patches

🔴Vulnerability Details

3
OSV
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy in github.com/oauth2-proxy/oauth2-proxy2024-08-21
GHSA
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy2021-05-25
OSV
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy2021-05-25