Cross-site Request Forgery (CSRF) Affecting auth0-aspnet package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-AUTH0ASPNET-5601106
  • published25 May 2023
  • disclosed14 May 2022
  • creditKévin Chalet

Introduced: 14 May 2022

CVE-2018-15121  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

There is no fixed version for auth0-aspnet.

Overview

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to not using or validating the state parameter of the OAuth 2.0 and OpenID Connect protocols. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.

Note:

Further development of the auth0-aspnet and auth0-aspnet-owin packages has been discontinued. The vendor recommends migrating to OWIN 4 and the official Microsoft.Owin.Security.OpenIdConnect package, which is not vulnerable.

References

CVSS Scores

version 3.1