9.28.0
11 years ago
1 months ago
Known vulnerabilities in the auth0-js package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
auth0-js is a Client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Privilege Escalation via the How to fix Privilege Escalation? Upgrade | <8.0.0 |
auth0-js is a Client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) attacks if the Legacy Lock API flag is enabled. Once the user credentials are verified, an HTML form is rendered into the user’s browser. A JSON Web Token (JWT) is POSTed to the How to fix Cross-site Request Forgery (CSRF)? Upgrade | <9.0.0 |
auth0-js is a client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to mishandling the case where the authorization response lacks the state parameter. How to fix Cross-site Request Forgery (CSRF)? Upgrade | <9.3.0 |
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated user's tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with | <8.12.0 |