6.1
CVSSv3

CVE-2019-9837

Published: 21/03/2019 Updated: 27/03/2019
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x prior to 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openid openid connect

Vendor Advisories

Debian Bug report logs - #924747 ruby-doorkeeper-openid-connect: CVE-2019-9837 Package: src:ruby-doorkeeper-openid-connect; Maintainer for src:ruby-doorkeeper-openid-connect is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Da ...