Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain allowlist filter via a crafted domain.
For example, if the setting is initialized with:
jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];
An attacker can set up a domain whitelistedXexample.com that will pass the allow list filter, as it considers the . separator to be a regex whildcard which matches any character.
{
"github_reviewed_at": "2023-10-19T18:21:26Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"nvd_published_at": "2018-06-19T19:29:00Z"
}