Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01OGg0LTltN20tajltNM4AAw0w

@okta/oidc-middlewareOpen Redirect vulnerability

An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.

Affected products and versions
Okta OIDC Middleware prior to version 5.0.0.

Resolution
The vulnerability is fixed in OIDC Middleware 5.0.0. To remediate this vulnerability, upgrade Okta OIDC Middleware to this version or later.

CVE details
CVE ID: CVE-2022-3145
Published Date: 01/05/2023
Vulnerability Type: Open Redirect
CWE: CWE-601
CVSS v3.1 Score: 4.3
Severity: Medium
Vector string: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Severity Details
To exploit this issue, an attacker would need to send a victim a malformed URL containing a target server that they control. Once a user successfully completed the login process, the victim user would then be redirected to the attacker controlled site.

References
https://github.com/okta/okta-oidc-middleware

Permalink: https://github.com/advisories/GHSA-58h4-9m7m-j9m4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01OGg0LTltN20tajltNM4AAw0w
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 4.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Identifiers: GHSA-58h4-9m7m-j9m4, CVE-2022-3145
References: Repository: https://github.com/okta/okta-oidc-middleware
Blast Radius: 11.9

Affected Packages

npm:@okta/oidc-middleware
Dependent packages: 9
Dependent repositories: 341
Downloads: 38,515 last month
Affected Version Ranges: < 5.0.0
Fixed in: 5.0.0
All affected versions: 0.0.2, 0.0.6, 0.0.13, 0.0.14, 0.0.15, 0.1.0, 0.1.1, 0.1.2, 0.1.3, 1.0.0, 1.0.1, 1.0.2, 2.0.0, 2.1.0, 3.0.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0, 4.5.1
All unaffected versions: 5.0.0, 5.0.1, 5.1.0, 5.2.0, 5.2.1, 5.3.0, 5.4.0