auth0-js@7.0.2 vulnerabilities
Auth0 headless browser sdk
-
latest version
9.28.0
-
latest non vulnerable version
-
first published
11 years ago
-
latest version published
a month ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the auth0-js package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
auth0-js is a Client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Privilege Escalation via the How to fix Privilege Escalation? Upgrade |
<8.0.0
|
auth0-js is a Client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) attacks if the Legacy Lock API flag is enabled. Once the user credentials are verified, an HTML form is rendered into the user’s browser. A JSON Web Token (JWT) is POSTed to the How to fix Cross-site Request Forgery (CSRF)? Upgrade |
<9.0.0
|
auth0-js is a client Side Javascript toolkit for Auth0 API. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to mishandling the case where the authorization response lacks the state parameter. How to fix Cross-site Request Forgery (CSRF)? Upgrade |
<9.3.0
|
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated user's tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with |
<8.12.0
|