Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12bTJwLWY1ajQtbWo2Z84AAWcv
Auth0 angular-jwt misinterprets allowlist as regex
Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains
setting to bypass the domain allowlist filter via a crafted domain.
For example, if the setting is initialized with:
jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];
An attacker can set up a domain whitelistedXexample.com
that will pass the allow list filter, as it considers the .
separator to be a regex whildcard which matches any character.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12bTJwLWY1ajQtbWo2Z84AAWcv
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 7 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Identifiers: GHSA-vm2p-f5j4-mj6g, CVE-2018-11537
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-11537
- https://auth0.com/docs/security/bulletins/cve-2018-11537
- https://github.com/auth0/angular-jwt/pull/174
- https://github.com/auth0/angular-jwt/commit/a4f03b49c3fb47cc6375c2a33b5ac11ca3c606f0
- https://github.com/auth0/angular-jwt/commit/e368cf124443507f1710f60ae855c4c54eebc6ea
- https://github.com/advisories/GHSA-vm2p-f5j4-mj6g
Blast Radius: 19.0
Affected Packages
npm:angular-jwt
Dependent packages: 26Dependent repositories: 849
Downloads: 49,667 last month
Affected Version Ranges: < 0.1.10
Fixed in: 0.1.10
All affected versions: 0.0.1, 0.0.2, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.1.9
All unaffected versions: 0.1.10, 0.1.11