GHSA-prfq-f66g-43mp

Suggest an improvement
Source
https://github.com/advisories/GHSA-prfq-f66g-43mp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-prfq-f66g-43mp/GHSA-prfq-f66g-43mp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-prfq-f66g-43mp
Aliases
Related
Published
2020-04-10T18:19:10Z
Modified
2023-11-08T04:03:53.578184Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Information disclosure through error object in auth0.js
Details

Overview

Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.

If the error object is exposed or logged without modification, the application risks password exposure.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

  • You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
  • You store or display error objects without filtering.

How to fix that?

Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.

Will this update impact my users?

This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-04-09T15:53:16Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-522"
    ],
    "severity": "HIGH"
}
References

Affected packages

npm / auth0-js

Package

Affected ranges

Type
SEMVER
Events
Introduced
8.0.0
Fixed
9.13.2