Skip to content

Information disclosure through error object

Moderate
MarcinHoppe published GHSA-prfq-f66g-43mp Apr 9, 2020

Package

npm auth0.js (npm)

Affected versions

>=8.0.0 <= 9.13.1

Patched versions

9.13.2

Description

Overview

Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.

If the error object is exposed or logged without modification, the application risks password exposure.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

  • You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
  • You store or display error objects without filtering.

How to fix that?

Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.

Will this update impact my users?

This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.

Severity

Moderate

CVE ID

CVE-2020-5263

Weaknesses

No CWEs