expo@46.0.0-beta.3 vulnerabilities

The Expo SDK

  • latest version

    55.0.5

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    2 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the expo package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Insufficiently Protected Credentials

    expo is an umbrella package that contains the client-side code for accessing system functionality such as contacts, camera, and location in Expo apps.

    Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the Expo AuthSession Redirect Proxy process. An attacker can gain unauthorized access to user accounts and obtain sensitive credentials by tricking a victim into clicking a crafted malicious link. This is because auth.expo.io stores an app’s callback URL before the user explicitly confirms they trust it.

    Note: The vulnerability has been mitigated by requiring users to confirm unverified callback URLs. In addition, developers are advised to migrate from useProxy and the auth.expo.io service (deprecated as of SDK 48) to using their own deep links with third-party authentication providers directly, which is more secure and reliable.

    How to fix Insufficiently Protected Credentials?

    Upgrade expo to version 48.0.0 or higher.

    >=45.0.0 <48.0.0