Vulnerability Description
auth0.js (NPM package auth0-js) greater than version 8.0.0 and before version 9.12.3 has a vulnerability. In the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered. If the error object is exposed or logged without modification, the application risks password exposure. This is fixed in version 9.12.3
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Auth0 | Auth0.Js | >= 8.0.0, <= 9.13.1 |
Related Weaknesses (CWE)
References
- https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d71082PatchThird Party Advisory
- https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mpThird Party Advisory
- https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d71082PatchThird Party Advisory
- https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mpThird Party Advisory
FAQ
What is CVE-2020-5263?
CVE-2020-5263 is a vulnerability with a CVSS score of 5.5 (MEDIUM). auth0.js (NPM package auth0-js) greater than version 8.0.0 and before version 9.12.3 has a vulnerability. In the case of an (authentication) error, the error object returned by the library contains th...
How severe is CVE-2020-5263?
CVE-2020-5263 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5263?
Check the references section above for vendor advisories and patch information. Affected products include: Auth0 Auth0.Js.