Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q6W5-JG5Q-47VG
HistoryJan 12, 2024 - 8:27 p.m.

@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

2024-01-1220:27:29
CWE-284
CWE-287
CWE-639
GitHub Advisory Database
github.com
8
security vulnerability
idor
unauthorized access
privilege escalation
logic flaw
@clerk/nextjs
authentication
next.js
api routes
app router
route handlers
patch
update

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.7%

Impact

Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router.

Affected Versions

All applications that that use @clerk/nextjs versions in the range of >= 4.7.0,< 4.29.3 in a Next.js backend to authenticate API Routes, App Router, or Route handlers. Specifically, those that call auth() in the App Router or getAuth() in the Pages Router. Only the @clerk/nextjs SDK is impacted. Other SDKs, including other Javascript-based SDKs, are not impacted.

Patches

Fix included in @clerk/[email protected].

References

Affected configurations

Vulners
Node
clerkclerk.ioRange<4.29.3wordpress
CPENameOperatorVersion
@clerk/nextjslt4.29.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.7%

Related for GHSA-Q6W5-JG5Q-47VG