Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-35924

Опубликовано: 02 авг. 2022
Источник: nvd
CVSS3: 9.1
EPSS Низкий

Описание

NextAuth.js is a complete open source authentication solution for Next.js applications. next-auth users who are using the EmailProvider either in versions before 4.10.3 or 3.29.10 are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: attacker@attacker.com,victim@victim.com) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim's e-mail addresses. The attacker could then login as a newly created user with the email being attacker@attacker.com,victim@victim.com. This means that basic authorization like email.endsWith("@victim.com") in the signIn callback would fail to communicate a threat to the developer and would let the attacker bypass authorization, even with an @attacker.com address. This vulnerability has been patched in v4.10.3 and v3.29.10 by normalizing the email value that is sent to the sign-in endpoint before accessing it anywhere else. We also added a `normalizeIdentifier

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:nextauth.js:next-auth:*:*:*:*:*:node.js:*:*
Версия до 3.29.10 (исключая)
cpe:2.3:a:nextauth.js:next-auth:*:*:*:*:*:node.js:*:*
Версия от 4.0.0 (включая) до 4.10.3 (исключая)

EPSS

Процентиль: 61%
0.0042
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-20
CWE-863

Связанные уязвимости

CVSS3: 9.1
github
больше 3 лет назад

NextAuth.js before 4.10.3 and 3.29.10 sending verification requests (magic link) to unwanted emails

EPSS

Процентиль: 61%
0.0042
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-20
CWE-863