Sha256: d940927044b10aadfe9ed3c9b84d828db2e40900453660347c974357eb347626

Contents?: true

Size: 655 Bytes

Versions: 1

Compression:

Stored size: 655 Bytes

Contents

---
gem: doorkeeper-openid_connect
cve: 2019-9837
date: 2019-03-25
url: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md#v154-2019-02-15
title: Doorkeeper::OpenidConnect Open Redirect
description: Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper)
  1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in
  an OAuth authorization request (that results in an error response) with the 'openid'
  scope and a prompt=none value. This allows phishing attacks against the authorization
  flow.
cvss_v3: 6.1
patched_versions:
  - ">= 1.5.4"
unaffected_versions:
  - "< 1.4.0"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/doorkeeper-openid_connect/CVE-2019-9837.yml