Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0393 Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.
Github GHSA Github GHSA GHSA-vv4c-g6q7-p3q7 Doorkeeper-openid_connect contains Open Redirect
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:01:54.968Z

Reserved: 2019-03-15T00:00:00

Link: CVE-2019-9837

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-21T16:01:17.280

Modified: 2024-11-21T04:52:24.510

Link: CVE-2019-9837

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses