Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
@workos/authkit-session: Open Redirect via state-derived redirect target
Vulnerability Description
@workos/authkit-session is a toolkit for building WorkOS AuthKit framework integrations. Prior to 0.5.1, an open redirect vulnerability exists in AuthService.handleCallback due to insufficient validation of the returnPathname value derived from the OAuth state parameter. The state parameter is round-tripped through the identity provider (IdP) and can be influenced by an attacker. The handleCallback function decodes and returns returnPathname without enforcing restrictions on origin or scheme. As a result, attacker-controlled values may be returned to the application. If this value is used directly in a redirect, it may cause the user to be redirected to an external, attacker-controlled site. This vulnerability is fixed in 0.5.1.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Vulnerability Title
@workos/authkit-session 输入验证错误漏洞
Vulnerability Description
@workos/authkit-session是WorkOS开源的一个会话认证与令牌管理工具。 @workos/authkit-session 0.5.1之前版本存在输入验证错误漏洞,该漏洞源于AuthService.handleCallback中returnPathname值验证不足,可能导致攻击者通过OAuth状态参数影响重定向目标,进而使用户被重定向到外部攻击者控制的站点。
CVSS Information
N/A
Vulnerability Type
N/A