Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-39263
HistorySep 28, 2022 - 9:05 p.m.

CVE-2022-39263 NextAuth.js Upstash Adapter missing token verification

2022-09-2821:05:09
CWE-287
GitHub_M
www.cve.org
1

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

@next-auth/upstash-redis-adapter is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use next-auth Email Provider and @next-auth/upstash-redis-adapter before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim’s email could easily sign in as the victim, given the attacker also knows about the verification token’s expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query’s token and identifier before proceeding.

CNA Affected

[
  {
    "product": "next-auth",
    "vendor": "nextauthjs",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.0.2"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

8.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

Related for CVELIST:CVE-2022-39263