CVE-2021-21291
Summary
| CVE | CVE-2021-21291 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-02-02 19:15:00 UTC |
| Updated | 2021-02-08 16:36:00 UTC |
| Description | OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are allowed. Instead, "example.com" and "badexample.com" could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Release v7.0.0 · oauth2-proxy/oauth2-proxy · GitHub |
MISC |
github.com |
Release Notes, Third Party Advisory |
| Merge pull request from GHSA-4mf2-f3wh-gvf2 · oauth2-proxy/oauth2-proxy@780ae4f · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Subdomain checking of whitelisted domains could allow unintended redirects · Advisory · oauth2-proxy/oauth2-proxy · GitHub |
CONFIRM |
github.com |
Exploit, Third Party Advisory |
| oauth2-proxy · pkg.go.dev |
MISC |
pkg.go.dev |
Product, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 690367 Free Berkeley Software Distribution (FreeBSD) Security Update for oauth2-proxy (3003ba60-6cec-11eb-8815-040e3c1b8a02)
- 982401 Go (go) Security Update for github.com/oauth2-proxy/oauth2-proxy (GHSA-4mf2-f3wh-gvf2)