漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Audiobookshelf vulnerable to OIDC token exfiltration and account takeover
Vulnerability Description
Audiobookshelf is an open-source self-hosted audiobook server. In versions 2.6.0 through 2.26.3, the application does not properly restrict redirect callback URLs during OIDC authentication. An attacker can craft a login link that causes Audiobookshelf to store an arbitrary callback in a cookie, which is later used to redirect the user after authentication. The server then issues a 302 redirect to the attacker-controlled URL, appending sensitive OIDC tokens as query parameters. This allows an attacker to obtain the victim's tokens and perform full account takeover, including creating persistent admin users if the victim is an administrator. Tokens are further leaked via browser history, Referer headers, and server logs. This vulnerability impacts all Audiobookshelf deployments using OIDC; no IdP misconfiguration is required. The issue is fixed in version 2.28.0. No known workarounds exist.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
凭证传输未经安全保护
Vulnerability Title
Audiobookshelf 安全漏洞
Vulnerability Description
Audiobookshelf是Audiobookshelf开源的一个自托管的有声读物和播客服务器。 Audiobookshelf 2.6.0至2.26.3版本存在安全漏洞,该漏洞源于OIDC认证中未限制重定向回调URL,可能导致账户接管。
CVSS Information
N/A
Vulnerability Type
N/A