Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8r88-6cj9-9fh5

Опубликовано: 27 мая 2025
Источник: github
Github: Прошло ревью
CVSS4: 1.3

Описание

auth-js Vulnerable to Insecure Path Routing from Malformed User Input

Impact

The library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called.

Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this.

Patches

Strict value checks have been added to all affected functions. These functions now require that the userId and factorId parameters MUST be valid UUID (v4).

Patched version: >= 2.69.1

Workarounds

Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. It is recommended that users of the auth-js library always follow security best practice and validate all inputs, before passing these to other functions or libraries.

References

https://github.com/supabase/auth-js/pull/1063

Пакеты

Наименование

@supabase/auth-js

npm
Затронутые версииВерсия исправления

< 2.69.1

2.69.1

EPSS

Процентиль: 12%
0.0004
Низкий

1.3 Low

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
9 месяцев назад

auth-js is an isomorphic Javascript library for Supabase Auth. Prior to version 2.69.1, the library functions getUserById, deleteUser, updateUserById, listFactors and deleteFactor did not require the user supplied values to be valid UUIDs. This could lead to a URL path traversal, resulting in the wrong API function being called. Implementations that follow security best practice and validate user controlled inputs, such as the userId are not affected by this. This issue has been patched in version 2.69.1.

EPSS

Процентиль: 12%
0.0004
Низкий

1.3 Low

CVSS4

Дефекты

CWE-22