9.1
CVSSv3

CVE-2021-26715

Published: 25/03/2021 Updated: 29/03/2021
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

The OpenID Connect server implementation for MITREid Connect up to and including 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mitreid connect

Github Repositories

exploits CVE DESCRIPTION LINK CVE-2021-27582 MITREid-Connect-mass-assignment(autobinding) githubcom/FB-Sec/Translation/blob/main/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90md CVE-2021-26715 MITREid-Connect-SSRF githubcom/FB-Sec/Translation/blob/main/OAuth%E9