Security
Headlines
HeadlinesLatestCVEs

Tag

#js

CVE-2022-35924: Callbacks | NextAuth.js

NextAuth.js is a complete open source authentication solution for Next.js applications. `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `[email protected],[email protected]`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim's e-mail addresses. The attacker could then login as a newly created user with the email being `[email protected],[email protected]`. This means that basic authorization like `email.endsWith("@victim.com")` in the `signIn` callback would fail to communicate a threat to the developer and would let the attacker bypass authorization, even with an `@attacker.com` address. This vulnerability has been patched in `v4.10.3` and `v3.29.10` by normalizing the email value that is sent to the sign-in endpoint before accessing it anywhere else. We also added a `normalizeIdentifier...

CVE
#vulnerability#web#ios#js#oauth#auth
GHSA-xv97-c62v-4587: NextAuth.js before 4.10.3 and 3.29.10 sending verification requests (magic link) to unwanted emails

### Impact `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `[email protected],[email protected]`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim's e-mail addresses. The attacker could then login as a newly created user with the email being `[email protected],[email protected]`. This means that basic authorization like `email.endsWith("@victim.com")` in the `signIn` callback would fail to communicate a threat to the developer and would let the attacker bypass authorization, even with an `@attacker.com` address. ### Patches We patched this vulnerability in `v4.10.3` and `v3.29.10` by normalizing the email value that is sent to the sign-in endpoint before accessing it anywhere else. We also added a `normalizeIdentifier` callback on the `EmailProvider` configuration, where you can furthe...

CVE-2020-28437: Snyk Vulnerability Database | Snyk

This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.

CVE-2020-7795: get-npm-package-version

The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.

CVE-2020-28434: Snyk Vulnerability Database | Snyk

This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.

CVE-2020-28433: Snyk Vulnerability Database | Snyk

This affects all versions of package node-latex-pdf.

CVE-2020-28453: Snyk Vulnerability Database | Snyk

This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.