Skip to content

Fix open redirect vulnerability in OAuth return path#74

Merged
ericmj merged 1 commit intomainfrom
ericmj/fix-open-redirect
Mar 10, 2026
Merged

Fix open redirect vulnerability in OAuth return path#74
ericmj merged 1 commit intomainfrom
ericmj/fix-open-redirect

Conversation

@ericmj
Copy link
Member

@ericmj ericmj commented Mar 10, 2026

Validate that the OAuth return path stored in the session is a safe relative path. Protocol-relative URLs (e.g. //evil.com) are rejected and replaced with "/" to prevent redirecting users to external domains after the OAuth flow completes.

Validate that the OAuth return path stored in the session is a safe
relative path. Protocol-relative URLs (e.g. //evil.com) are rejected
and replaced with "/" to prevent redirecting users to external domains
after the OAuth flow completes.
@ericmj ericmj merged commit e74d130 into main Mar 10, 2026
8 checks passed
@ericmj ericmj deleted the ericmj/fix-open-redirect branch March 10, 2026 18:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant