The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. Upgrade to version `1.4.1` to resolve. The fix adds basic HTML escaping to the error message and it should not impact your users.
References
Link | Resource |
---|---|
https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf | Patch Third Party Advisory |
https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7 | Third Party Advisory |
https://www.npmjs.com/package/%40auth0/nextjs-auth0 | |
https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf | Patch Third Party Advisory |
https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7 | Third Party Advisory |
https://www.npmjs.com/package/%40auth0/nextjs-auth0 |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf - Patch, Third Party Advisory | |
References | () https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7 - Third Party Advisory | |
References | () https://www.npmjs.com/package/%40auth0/nextjs-auth0 - | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 8.0 |
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-06-25 17:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32702
Mitre link : CVE-2021-32702
CVE.ORG link : CVE-2021-32702
JSON object : View
Products Affected
auth0
- nextjs-auth0
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')