-
Notifications
You must be signed in to change notification settings - Fork 32
Open
Description
Hi, while perusing the code I noticed this function:
Lines 127 to 133 in 685118c
| func isValidIssuer(iss string, proxyURL *string) bool { | |
| if proxyURL != nil { | |
| return iss == *proxyURL | |
| } | |
| return strings.HasPrefix(iss, "https://clerk.") || | |
| strings.Contains(iss, ".clerk.accounts") | |
| } |
It appears to accept any issuer whose first domain segment is clerk.. Is this intentional? While it may not lead to a vulnerability on its own, it seems like it would have to be undesirable to accept an issuer like https://clerk.example.com (or substitute any attacker domain suffix).
Again I'm not saying this is itself a vulnerability, but if this check has any purpose at all then it would seem to be not doing a good enough job of serving it.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels