Skip to main content

URL Redirection to Untrusted Site ('Open Redirect')

CVE-2022-36087

Severity Medium
Score 6.5/10

Summary

OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 through 3.2.1, an attacker providing a malicious redirect URI can cause a denial of service. An attacker can also leverage the usage of `uri_validate` functions depending on where it is used. OAuthLib applications using OAuth2.0 provider support or using directly `uri_validate` are affected by this issue. There are no known workarounds.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • REQUIRED
  • NONE
  • NONE
  • HIGH

CWE-601 - Open Redirect

An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.

References

Advisory Timeline

  • Published