URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
High severity
GitHub Reviewed
Published
Mar 29, 2022
in
auth0/express-openid-connect
•
Updated Jan 27, 2023
Description
Published to the GitHub Advisory Database
Mar 31, 2022
Reviewed
Mar 31, 2022
Published by the National Vulnerability Database
Mar 31, 2022
Last updated
Jan 27, 2023
Impact
Users of the
requiresAuth
middleware, either directly or through the defaultauthRequired
option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route.If all routes under
example.com
are protected with therequiresAuth
middleware, a visit tohttp://example.com//google.com
will be redirected togoogle.com
after login because the original url reported by the Express framework is not properly sanitised.Am I affected?
You are affected by this vulnerability if you are using the
requiresAuth
middleware on a catch all route or the defaultauthRequired
option andexpress-openid-connect
version<=2.7.1
.How to fix that?
Upgrade to version
>=2.7.2
Will this update impact my users?
The fix provided in the patch will not affect your users.
References