Логотип exploitDog
bind:CVE-2022-39263
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-39263

Количество 3

Количество 3

nvd логотип

CVE-2022-39263

почти 3 года назад

`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-4rxr-27mm-mxq9

почти 3 года назад

Upstash Adapter missing token verification

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2022-06147

почти 3 года назад

Уязвимость программной платформы Node.js, связанная с ошибками реализации процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-39263

`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.

CVSS3: 6.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-4rxr-27mm-mxq9

Upstash Adapter missing token verification

CVSS3: 6.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-06147

Уязвимость программной платформы Node.js, связанная с ошибками реализации процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу