URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
High severity
GitHub Reviewed
Published
Mar 29, 2022
in
auth0/express-openid-connect
•
Updated Jan 27, 2023
Description
Published to the GitHub Advisory Database
Mar 31, 2022
Reviewed
Mar 31, 2022
Published by the National Vulnerability Database
Mar 31, 2022
Last updated
Jan 27, 2023
Impact
Users of the
requiresAuthmiddleware, either directly or through the defaultauthRequiredoption, are vulnerable to an Open Redirect when the middleware is applied to a catch all route.If all routes under
example.comare protected with therequiresAuthmiddleware, a visit tohttp://example.com//google.comwill be redirected togoogle.comafter login because the original url reported by the Express framework is not properly sanitised.Am I affected?
You are affected by this vulnerability if you are using the
requiresAuthmiddleware on a catch all route or the defaultauthRequiredoption andexpress-openid-connectversion<=2.7.1.How to fix that?
Upgrade to version
>=2.7.2Will this update impact my users?
The fix provided in the patch will not affect your users.
References