In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API
References
Link | Resource |
---|---|
https://github.com/auth0/node-auth0/pull/507 | Patch Third Party Advisory |
https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c | Patch Third Party Advisory |
https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53 | Third Party Advisory |
https://github.com/auth0/node-auth0/tree/v2.27.1 | Release Notes Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-07-29 17:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-15125
Mitre link : CVE-2020-15125
CVE.ORG link : CVE-2020-15125
JSON object : View
Products Affected
auth0
- auth0.js
CWE
CWE-209
Generation of Error Message Containing Sensitive Information