-
-
Notifications
You must be signed in to change notification settings - Fork 15.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
oauth2_proxy: Backport security fix (CVE-2017-1000070) #86108
Conversation
Lgtm |
Perhaps mention the CVE in the patch filename?
https://www.cvedetails.com/cve/CVE-2017-1000070/
…On Mon, Apr 27, 2020, 10:17 Nikola Knežević ***@***.***> wrote:
This PR is the result of the discussion in #79840
<#79840>
@flokli <https://github.com/flokli> @arianvp <https://github.com/arianvp>
please take a look
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#86108 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAEZNI6VK3LFWF25OKBFWLDROU5QVANCNFSM4MRWKI6A>
.
|
Is it possible to use |
df66b71
to
cf08beb
Compare
cf08beb
to
b6c591c
Compare
TIL. Thanks, done. |
Could you remove the GitHub handles from the commit message? Otherwise I'll get s notification from every fork of nixpkgs on GitHub for the coming weeks due to Githubs completely broken notification policy |
Since 20.03 still uses old oauth2_proxy (3.2.0), which is not compatible with the newest one (5.1.0), this change backports an important security fix to 3.2.0: oauth2-proxy/oauth2-proxy@a316f8a The vulnerability is an open redirect, where a bad actor can redirect a session to another domain using `/\` in redirect URIs.
b6c591c
to
92ab877
Compare
Result of |
Motivation for this change
Since 20.03 still uses old oauth2_proxy (3.2.0), which is not compatible
with the newest one (5.1.0), this change backports an important security
fix to 3.2.0:
oauth2-proxy/oauth2-proxy@a316f8a
The vulnerability is an open redirect, where a bad actor can redirect a
session to another domain using
/\
in redirect URIs.The patch has been obtained by running:
on https://github.com/pusher/oauth2_proxy repository clone.
Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)