First published: Tue Jun 19 2018(Updated: )
Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the `jwtInterceptorProvider.whiteListedDomains` setting to bypass the domain allowlist filter via a crafted domain. For example, if the setting is initialized with: `jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];` An attacker can set up a domain `whitelistedXexample.com` that will pass the allow list filter, as it considers the `.` separator to be a regex whildcard which matches any character.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 angular-jwt | <0.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11537 is classified as a medium severity vulnerability due to its potential to allow unauthorized access.
To fix CVE-2018-11537, upgrade the Auth0 angular-jwt library to version 0.1.10 or later.
CVE-2018-11537 is a vulnerability that allows remote attackers to bypass the domain allowlist filter by misusing regular expressions.
Users of Auth0 angular-jwt versions prior to 0.1.10 are affected by CVE-2018-11537.
The impact of CVE-2018-11537 is that it can lead to unauthorized domain access, compromising the security of the application.