Skip to content

Authorization header is not sanitized in an error object in auth0

High severity GitHub Reviewed Published Jul 28, 2020 in auth0/node-auth0 • Updated Jan 9, 2023

Package

npm auth0 (npm)

Affected versions

< 2.27.1

Patched versions

2.27.1

Description

Overview

Versions before and including 2.27.0 use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for Authorization header is not sanitized and the Authorization header value can be logged exposing a bearer token.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

How to fix that?

Upgrade to version 2.27.1

Will this update impact my users?

The fix provided in patch will not affect your users.

Credit

http://github.com/osdiab

References

@lzychowski lzychowski published to auth0/node-auth0 Jul 28, 2020
Reviewed Jul 29, 2020
Published to the GitHub Advisory Database Jul 29, 2020
Last updated Jan 9, 2023

Severity

High
7.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2020-15125

GHSA ID

GHSA-5jpf-pj32-xx53

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.