Miggo Logo

GHSA-xm3x-4ph3-3x9c: friendsofsymfony/oauth2-php open redirection in oauth

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
friendsofsymfony/oauth2-phpcomposer< 1.3.01.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper URI validation in the validateRedirectUri method. The pre-patch implementation (strcasecmp(substr(...)) check) allowed partial domain matches, while the patch introduced exact host/port validation via parse_url(). The added test cases in OAuth2Test.php demonstrate scenarios where subdomain/port manipulation would bypass security without this exact check. The function's direct modification in the security patch confirms its role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n op*n r**ir**tion vuln*r**ility **s ***n i**nti*i** in t** *ri*n*so*sym*ony/o*ut**-p*p li*r*ry, w*i** *oul* pot*nti*lly *xpos* us*rs to un*ut*oriz** r**ir**ts *urin* t** O*ut* *ut**nti**tion pro**ss. T*is vuln*r**ility **s ***n ***r*ss** *y impl*m*

Reasoning

T** vuln*r**ility st*mm** *rom improp*r URI v*li**tion in t** `v*li**t*R**ir**tUri` m*t*o*. T** pr*-p*t** impl*m*nt*tion (`str**s**mp(su*str(...))` ****k) *llow** p*rti*l *om*in m*t***s, w*il* t** p*t** intro*u*** *x**t *ost/port v*li**tion vi* `p*rs