Sha256: d940927044b10aadfe9ed3c9b84d828db2e40900453660347c974357eb347626
Contents?: true
Size: 655 Bytes
Versions: 1
Compression:
Stored size: 655 Bytes
Contents
--- gem: doorkeeper-openid_connect cve: 2019-9837 date: 2019-03-25 url: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md#v154-2019-02-15 title: Doorkeeper::OpenidConnect Open Redirect description: Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow. cvss_v3: 6.1 patched_versions: - ">= 1.5.4" unaffected_versions: - "< 1.4.0"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/doorkeeper-openid_connect/CVE-2019-9837.yml |