Sourcegraph before 3.15.1 has a vulnerable authentication workflow because of improper validation in the SafeRedirectURL method in cmd/frontend/auth/redirect.go, such as for the //foo//example.com substring.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://github.com/sourcegraph/sourcegraph/pull/10167 | third party advisory patch |
https://github.com/sourcegraph/sourcegraph/compare/v3.15.0...v3.15.1 | third party advisory release notes |
https://github.com/sourcegraph/sourcegraph/commit/c0f48172e815c7f66471a38f0a06d1fc32a77a64 | third party advisory patch |
https://github.com/sourcegraph/sourcegraph/blob/master/CHANGELOG.md | third party advisory release notes |
https://securitylab.github.com/advisories/GHSL-2020-085-sourcegraph | third party advisory exploit |