Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vm2p-f5j4-mj6g

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Auth0 angular-jwt misinterprets allowlist as regex

Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain allowlist filter via a crafted domain.

For example, if the setting is initialized with:

jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];

An attacker can set up a domain whitelistedXexample.com that will pass the allow list filter, as it considers the . separator to be a regex whildcard which matches any character.

Пакеты

Наименование

angular-jwt

npm
Затронутые версииВерсия исправления

< 0.1.10

0.1.10

EPSS

Процентиль: 64%
0.00463
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 6.5
nvd
больше 7 лет назад

Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain whitelist filter via a crafted domain.

EPSS

Процентиль: 64%
0.00463
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-20