漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
@workos/authkit-session: Open Redirect via state-derived redirect target
Vulnerability Description
@workos/authkit-session is a toolkit for building WorkOS AuthKit framework integrations. Prior to 0.5.1, an open redirect vulnerability exists in AuthService.handleCallback due to insufficient validation of the returnPathname value derived from the OAuth state parameter. The state parameter is round-tripped through the identity provider (IdP) and can be influenced by an attacker. The handleCallback function decodes and returns returnPathname without enforcing restrictions on origin or scheme. As a result, attacker-controlled values may be returned to the application. If this value is used directly in a redirect, it may cause the user to be redirected to an external, attacker-controlled site. This vulnerability is fixed in 0.5.1.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Vulnerability Title
@workos/authkit-session 输入验证错误漏洞
Vulnerability Description
@workos/authkit-session是WorkOS开源的一个会话认证与令牌管理工具。 @workos/authkit-session 0.5.1之前版本存在输入验证错误漏洞,该漏洞源于AuthService.handleCallback中returnPathname值验证不足,可能导致攻击者通过OAuth状态参数影响重定向目标,进而使用户被重定向到外部攻击者控制的站点。
CVSS Information
N/A
Vulnerability Type
N/A