GHSA-q6w5-jg5q-47vg

Suggest an improvement
Source
https://github.com/advisories/GHSA-q6w5-jg5q-47vg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-q6w5-jg5q-47vg/GHSA-q6w5-jg5q-47vg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q6w5-jg5q-47vg
Aliases
Related
Published
2024-01-12T20:27:29Z
Modified
2024-01-12T22:33:02Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)
Details

Impact

Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router.

Affected Versions

All applications that that use @clerk/nextjs versions in the range of >= 4.7.0,< 4.29.3 in a Next.js backend to authenticate API Routes, App Router, or Route handlers. Specifically, those that call auth() in the App Router or getAuth() in the Pages Router. Only the @clerk/nextjs SDK is impacted. Other SDKs, including other Javascript-based SDKs, are not impacted.

Patches

Fix included in @clerk/nextjs@4.29.3.

References

  • https://clerk.com/changelog/2024-01-12
  • https://github.com/clerk/javascript/releases/tag/%40clerk%2Fnextjs%404.29.3
Database specific
{
    "nvd_published_at": "2024-01-12T20:15:47Z",
    "github_reviewed_at": "2024-01-12T20:27:29Z",
    "github_reviewed": true,
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-284",
        "CWE-287",
        "CWE-639"
    ]
}
References

Affected packages

npm / @clerk/nextjs

Package

Name
@clerk/nextjs
View open source insights on deps.dev
Purl
pkg:npm/%40clerk/nextjs

Affected ranges

Type
SEMVER
Events
Introduced
4.7.0
Fixed
4.29.3