CVE-2021-32702

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. Upgrade to version `1.4.1` to resolve. The fix adds basic HTML escaping to the error message and it should not impact your users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:auth0:nextjs-auth0:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf - Patch, Third Party Advisory () https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf - Patch, Third Party Advisory
References () https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7 - Third Party Advisory () https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7 - Third Party Advisory
References () https://www.npmjs.com/package/%40auth0/nextjs-auth0 - () https://www.npmjs.com/package/%40auth0/nextjs-auth0 -
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 8.0

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'name': 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'tags': ['Product', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.npmjs.com/package/%40auth0/nextjs-auth0 -

Information

Published : 2021-06-25 17:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32702

Mitre link : CVE-2021-32702

CVE.ORG link : CVE-2021-32702


JSON object : View

Products Affected

auth0

  • nextjs-auth0
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')