@keystone-6/auth@0.0.0-rc-20230214225011 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the @keystone-6/auth package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Open Redirect

@keystone-6/auth is a the latest version of Keystone.

Affected versions of this package are vulnerable to Open Redirect where the redirect leading / filter can be bypassed. Users may be redirected to domains other than the relative host. Thereby, it might be used by attackers to redirect users to an unexpected location.

How to fix Open Redirect?

Upgrade @keystone-6/auth to version 7.0.1 or higher.

<7.0.1
  • M
Cross-site Scripting (XSS)

@keystone-6/auth is a the latest version of Keystone.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when following an untrusted link to the sign-in or init page via the from= parameter in the URL.

PoC

  1. Install Keystone 6 On Your System.
  2. Go To http://localhost:3000/signin?from=http://evil.com And Login And You'll Be Redirected To evil.com.
  3. Go To http://localhost:3000/signin?from=javascript:alert(document.domain) And Login And After Login, You'll See Two Reflected XSS Pop Ups.

How to fix Cross-site Scripting (XSS)?

Upgrade @keystone-6/auth to version 1.0.2 or higher.

<1.0.2