GHSA-2mqv-4j3r-vjvp

Suggest an improvement
Source
https://github.com/advisories/GHSA-2mqv-4j3r-vjvp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-2mqv-4j3r-vjvp/GHSA-2mqv-4j3r-vjvp.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-2mqv-4j3r-vjvp
Aliases
Related
Published
2021-12-16T18:52:21Z
Modified
2023-11-01T04:56:45.515913Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Open redirect in @auth0/nextjs-auth0
Details

Overview

Versions <=1.6.1 do not filter out certain returnTo parameter values from the login url, which expose the application to an open redirect vulnerability.

Am I affected?

You are affected by this vulnerability if you are using @auth0/nextjs-auth0 version <=1.6.1.

How to fix that?

Upgrade to version >=1.6.2

Will this update impact my users?

The fix provided in the patch will not affect your users.

Database specific
{
    "nvd_published_at": "2021-12-16T19:15:00Z",
    "github_reviewed_at": "2021-12-16T18:42:05Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

npm / @auth0/nextjs-auth0

Package

Name
@auth0/nextjs-auth0
View open source insights on deps.dev
Purl
pkg:npm/%40auth0/nextjs-auth0

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.2