Description
Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain allowlist filter via a crafted domain.
Recommendation
Update the angular-jwt package to the latest compatible version. Followings are version details:
- Affected version(s): < 0.1.10
- Patched version(s): 0.1.10
References
Related Issues
- Auth0-js bypasses CSRF checks - CVE-2018-7307
- Path Traversal in angular-http-server - CVE-2018-3713
- Cross-Site Request Forgery (CSRF) in Auth0 - CVE-2018-6874
- Cisco node-jose improper validation of JWT signature - CVE-2018-0114
- Tags:
- npm
- angular-jwt
Anything's wrong? Let us know Last updated on October 19, 2023