-
Bug
-
Resolution: Obsolete
-
Undefined
-
None
-
4.12
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
No
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
During penetration tests an open-redirect vulnerability has been discovered on the login page.
Data in the 'then' argument that's normally present in the login page link are not verified in any way: https://oauth-openshift.apps.example.com/login/kube:admin?then=%2Foauth%2Fauthorize%3Fclient_id%3Dconsole%26idp%3Dkube%253Aadmin%26redirect_uri%3Dhttps%253A%252F%252Fconsole-openshift-console.apps.example.com%252Fauth%252Fcallback%26response_type%3Dcode%26scope%3Duser%253Afull%26state%3D6f302f1d
Attacker can prepare a legit looking login page link with a modified 'then' argument pointing to a completely different site, which is going to redirect the user to said site post login, effectively enabling a phishing attack. For example: https://oauth-openshift.apps.example.com/login/ad_login?then=%2F%5C%2Fgoogle.com%2F
Version-Release number of selected component (if applicable):
4.12
How reproducible:
Proces a login to OpenShift Web Console and check the link for the oauth-openshift.