First published: Wed Jul 29 2020(Updated: )
In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 Auth0.js | <2.27.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15125 is classified as a medium severity vulnerability due to the potential exposure of sensitive data.
To fix CVE-2020-15125, upgrade the auth0 package to version 2.27.1 or later.
CVE-2020-15125 affects auth0 (npm package) versions prior to 2.27.1.
CVE-2020-15125 is a data exposure vulnerability caused by improper sanitization of the Authorization header.
CVE-2020-15125 is found in the auth0.js package, specifically versions before 2.27.1.