Description
The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it’s missing from the authorization response, leaving the client vulnerable to CSRF attacks.
Recommendation
Update the auth0-js
package to the latest compatible version. Followings are version details:
- Affected version(s): < 9.3.0
- Patched version(s): 9.3.0
References
Related Issues
- Prototype Pollution in lodash - CVE-2018-3721
- Cross-site Scripting in quill - CVE-2021-3163
- Prototype Pollution in async - CVE-2021-43138
- Joplin Remote Code Execution - CVE-2022-40277
- Tags:
- npm
- auth0-js
Anything's wrong? Let us know Last updated on January 09, 2023