An issue was discovered in Auth0 auth0-aspnet and auth0-aspnet-owin. Affected packages do not use or validate the state parameter of the OAuth 2.0 and OpenID Connect protocols. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.
Max CVSS
8.8
EPSS Score
0.07%
Published
2018-08-29
Updated
2018-11-08
Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain whitelist filter via a crafted domain.
Max CVSS
6.5
EPSS Score
0.14%
Published
2018-06-19
Updated
2018-08-23
The Auth0 Auth0.js library before 9.3 has CSRF because it mishandles the case where the authorization response lacks the state parameter.
Max CVSS
8.8
EPSS Score
0.07%
Published
2018-03-06
Updated
2018-03-28
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
Max CVSS
8.8
EPSS Score
0.07%
Published
2018-04-04
Updated
2018-05-15
The Auth0 authentication service before 2017-10-15 allows privilege escalation because the JWT audience is not validated.
Max CVSS
9.8
EPSS Score
0.33%
Published
2018-04-04
Updated
2019-10-03
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Max CVSS
9.8
EPSS Score
0.56%
Published
2018-05-29
Updated
2019-10-09
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!