Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2390PUBLISHED: 2022-08-12
Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain th...
CVE-2022-2503PUBLISHED: 2022-08-12
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear targe...
CVE-2022-2779PUBLISHED: 2022-08-12
A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launche...
CVE-2022-38179PUBLISHED: 2022-08-12JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
CVE-2022-38180PUBLISHED: 2022-08-12In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
User Rank: Ninja
5/5/2014 | 2:11:57 PM
http://securityaffairs.co/wordpress/24585/intelligence/covert-redirect-oauth-openid.html
We cannot compare the severity of Covert Redirect vulnerability to theHeartbleed flaw, but it could be a serious error to underestimate it. Wang sustains that one of the main problem approaching the Covert Redirect flaw is to pretend that third-party sites will fix the problem.
To be honest, this isn't the first time the flaw has been debated, Covert Redirect has surely a minor impact than Heartbleed, which could expose the most critical information.
Last year, Egor Homakov reported similar issues and the IETF outline on OAuth 2.0 warns about the risk associated with open redirects in the redirect_uri. Also LinkedIn company raised an alert regarding registering URIs earlier this year.
I believe that we are not facing with a vulnerability in the principal web services provided by companies like Google and Facebook problem, the problem is not in the OAuth 2.0 framework, but it is the lack of token whitelisting in its implementation made by third parties.
Regards
Pierluigi