oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://tools.ietf.org/html/rfc7636 | third party advisory |
https://tools.ietf.org/html/draft-ietf-oauth-security-topics-15 | third party advisory exploit |
https://codeburst.io/missing-the-point-in-securing-oauth-2-0-83968708b467 | third party advisory |
https://github.com/oauthjs/node-oauth2-server/issues/637 | third party advisory exploit |
https://github.com/oauthjs/node-oauth2-server/pull/452 | third party advisory patch |