-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix open redirect starting with a slash and backslash #453
Fix open redirect starting with a slash and backslash #453
Conversation
Would it not be even better to just have a server-side configured
whitelist rather than trying to enumerate badness and ban it?
Surely for a given configuration there will only be a few, mostly
likely one, logout URL to redirect to anyway?
|
I feel the same way. There are other problems with checking the Redirect URL. Is this a new issue better? |
a new feature request issue is best for tracking support for whitelisted logout URLs |
This patch was created in response to CVE-2019-3877 in mod_auth_mellon, so shouldn't there be a CVE issued? Red Hat is quite responsive issues CVEs. Just mail [email protected]. |
Where are those tracked? Just as mails on the mailing list? The issue tracker seems to have been closed. |
So, this is a different flaw than CVE-2019-14857, isn't it? Anybody has anything against me requesting a new CVE to MITRE? (MITRE is slightly preferred than Red Hat in this case, to avoid possible duplicates). |
sure, go ahead |
CVE-2019-20479 has been assigned to this issue. |
add new OIDCRedirectURLsAllowed primitive to handle post logout and refresh-return-to validation; addresses #453; closes #466 Signed-off-by: Hans Zandbelt <[email protected]>
the whitelisting of logout URLs is now in release 2.4.3, https://github.com/zmartzone/mod_auth_openidc/blob/v2.4.3/auth_openidc.conf#L837-L844 |
add new OIDCRedirectURLsAllowed primitive to handle post logout and refresh-return-to validation; addresses OpenIDC#453; closes OpenIDC#466 Signed-off-by: Hans Zandbelt <[email protected]> (cherry picked from commit 8ea550f)
Fix open redirect to the following cases.
When the response HTTP header is 'Location: /\phishingsite.example.com/logout.html', the browser redirects to 'phishing-site.example.com'