mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[PR #5300] [CLOSED] fix: the frp oidc authentication in pkg/auth/oidc in oidc.go #5234
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#5234
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/fatedier/frp/pull/5300
Author: @orbisai0security
Created: 4/29/2026
Status: ❌ Closed
Base:
dev← Head:fix-oidc-issuer-validation-v003📝 Commits (1)
0f591affix: V-003 security vulnerability📊 Changes
1 file changed (+2 additions, -1 deletions)
View changed files
📝
pkg/auth/oidc.go(+2 -1)📄 Description
Summary
Fix critical severity security issue in
pkg/auth/oidc.go.Vulnerability
V-003pkg/auth/oidc.go:29Description: The frp OIDC authentication in pkg/auth/oidc.go uses a configurable OIDC provider URL. The existence of a mock OIDC server in the test suite confirms the application supports arbitrary, externally-configured OIDC providers. If the issuer (iss) claim is not strictly validated against a hardcoded or securely configured trusted issuer URL, an attacker who can influence the OIDC provider configuration or perform DNS hijacking can redirect authentication to a rogue provider that issues tokens granting full access.
Changes
pkg/auth/oidc.goVerification
Automated security fix by OrbisAI Security
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.