Vulnerabilities (CVE)

Filtered by vendor Auth0 Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-41246 1 Auth0 1 Express Openid Connect 2021-12-14 6.8 MEDIUM 8.8 HIGH
Express OpenID Connect is express JS middleware implementing sign on for Express web apps using OpenID Connect. Versions before and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. Versions `2.5.2` contains a patch for this issue.
CVE-2017-17068 1 Auth0 1 Auth0.js 2021-04-28 5.0 MEDIUM 7.5 HIGH
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with auth0.popup.callback().
CVE-2020-15259 1 Auth0 1 Ad\/ldap Connector 2020-11-18 6.8 MEDIUM 8.8 HIGH
ad-ldap-connector's admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13.
CVE-2020-15125 1 Auth0 1 Auth0.js 2020-08-03 4.0 MEDIUM 7.7 HIGH
In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API
CVE-2020-7948 1 Auth0 1 Login By Auth0 2020-04-02 6.5 MEDIUM 8.8 HIGH
An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. A user can perform an insecure direct object reference.
CVE-2020-5391 1 Auth0 1 Wp-auth0 2020-04-01 6.8 MEDIUM 8.8 HIGH
Cross-site request forgery (CSRF) vulnerabilities exist in the Auth0 plugin before 4.0.0 for WordPress via the domain field.
CVE-2019-16929 1 Auth0 1 Auth0.net 2019-10-17 5.0 MEDIUM 7.5 HIGH
Auth0 auth0.net before 6.5.4 has Incorrect Access Control because IdentityTokenValidator can be accidentally used to validate untrusted ID tokens.
CVE-2017-16897 1 Auth0 1 Passport-wsfed-saml2 2019-10-03 9.3 HIGH 8.1 HIGH
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
CVE-2019-13483 1 Auth0 1 Passport-sharepoint 2019-07-31 7.5 HIGH 7.3 HIGH
Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms.
CVE-2018-15121 1 Auth0 2 Aspnet, Aspnet-owin 2018-11-08 6.8 MEDIUM 8.8 HIGH
An issue was discovered in Auth0 auth0-aspnet and auth0-aspnet-owin. Affected packages do not use or validate the state parameter of the OAuth 2.0 and OpenID Connect protocols. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.
CVE-2018-6874 1 Auth0 1 Auth0.js 2018-05-15 6.8 MEDIUM 8.8 HIGH
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
CVE-2018-7307 1 Auth0 1 Auth0.js 2018-03-28 6.8 MEDIUM 8.8 HIGH
The Auth0 Auth0.js library before 9.3 has CSRF because it mishandles the case where the authorization response lacks the state parameter.