The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/bitly/oauth2_proxy/pull/359 | third party advisory patch |
https://tools.ietf.org/html/rfc6819#section-5.2.3.5 | technical description |