diff --git a/gems/google_sign_in/CVE-2025-58067.yml b/gems/google_sign_in/CVE-2025-58067.yml new file mode 100644 index 0000000000..a8ccaf674d --- /dev/null +++ b/gems/google_sign_in/CVE-2025-58067.yml @@ -0,0 +1,52 @@ +--- +gem: google_sign_in +cve: 2025-58067 +ghsa: 5jch-xhw4-r43v +url: https://github.com/basecamp/google_sign_in/security/advisories/GHSA-5jch-xhw4-r43v +title: Google Sign-In for Rails allowed redirect to protocol-relative URI +date: 2025-08-29 +description: | + ## Summary + + It is possible to redirect a user to another origin if the + "proceed_to" value in the session store is set to a + protocol-relative URL. + + ## Details + + The google_sign_in gem persists an optional URL for redirection + after authentication. If this URL is set to a protocol-relative URL, + it improperly passes the "same origin" check, and it's possible + for the user to be redirected to another origin after authentication, + possibly resulting in exposure of authentication information if + this attack is chained with other attacks. + + Normally the value of this URL is only written and read by the + library or the calling application. However, it may be possible to + set this session value from a malicious site with a form submission. + + ## Impact + + Any Rails applications using the google_sign_in gem may be vulnerable, + if this vector can be chained with another attack that is able to + modify the OAuth2 request parameters. + + ## Workarounds + + No known workarounds. + + ## Credits + + This issue was responsibly reported by Hackerone user + [muntrive](https://hackerone.com/muntrive?type=user). +cvss_v3: 4.2 +patched_versions: + - ">= 1.3.1" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2025-58067 + - https://github.com/basecamp/google_sign_in/security/advisories/GHSA-5jch-xhw4-r43v + - https://github.com/basecamp/google_sign_in/releases/tag/v1.3.1 + - https://github.com/basecamp/google_sign_in/pull/75 + - https://github.com/basecamp/google_sign_in/commit/e97aef4626b1bcbd2c6f01f7dd25f12ac855d4cc + - https://github.com/advisories/GHSA-5jch-xhw4-r43v