Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5jpf-pj32-xx53

Опубликовано: 29 июл. 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.7

Описание

Authorization header is not sanitized in an error object in auth0

Overview

Versions before and including 2.27.0 use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for Authorization header is not sanitized and the Authorization header value can be logged exposing a bearer token.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

How to fix that?

Upgrade to version 2.27.1

Will this update impact my users?

The fix provided in patch will not affect your users.

Credit

http://github.com/osdiab

Пакеты

Наименование

auth0

npm
Затронутые версииВерсия исправления

< 2.27.1

2.27.1

EPSS

Процентиль: 54%
0.00308
Низкий

7.7 High

CVSS3

Дефекты

CWE-209

Связанные уязвимости

CVSS3: 7.7
nvd
больше 5 лет назад

In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API

EPSS

Процентиль: 54%
0.00308
Низкий

7.7 High

CVSS3

Дефекты

CWE-209