3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:S/C:P/I:N/A:N
0.0004 Low
EPSS
Percentile
12.3%
next-auth is vulnerable to information disclosure. A local authenticated attacker is able to gain access to confidential information such as identity provider’s classified data from the log through error handling of oAuthCallback
function.
github.com/nextauthjs/next-auth/commit/0ea96796b29fa54c6ad5111fad3cbaeefd3c9eca
github.com/nextauthjs/next-auth/commit/d348ca1dc19fcb8c716cea198d33277cec4b9b23
github.com/nextauthjs/next-auth/security/advisories/GHSA-p6mm-27gq-9v3p
next-auth.js.org/configuration/options#logger
next-auth.js.org/getting-started/upgrade-v4
next-auth.js.org/warnings#debug_enabled
3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:S/C:P/I:N/A:N
0.0004 Low
EPSS
Percentile
12.3%