doorkeeper-openid_connect 1.5.2

1 security vulnerability found in version 1.5.2

Doorkeeper::OpenidConnect Open Redirect

medium severity CVE-2019-9837
medium severity CVE-2019-9837
Patched versions: >= 1.5.4
Unaffected versions: < 1.4.0

Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.