ID CVE-2021-43812
Summary The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before 1.6.2 do not filter out certain returnTo parameter values from the login url, which expose the application to an open redirect vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
References
Vulnerable Configurations
  • cpe:2.3:a:auth0:nextjs-auth0:-:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:-:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.1.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.1.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.3.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.3.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.4.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.4.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.5.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.5.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.6.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.6.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.7.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.7.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.8.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.8.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.9.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.9.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.10.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.10.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.11.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.11.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.12.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.12.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.13.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.13.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.14.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.14.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.15.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.15.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.16:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.16:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:0.16.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:0.16.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.0.0:-:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.0.0:-:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta0:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta0:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta1:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta1:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta2:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.0.0:beta2:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.1.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.1.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.2.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.2.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.3.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.3.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.3.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.3.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.4.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.4.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.4.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.4.1:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.4.2:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.4.2:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.5.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.5.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.6.0:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.6.0:*:*:*:*:node.js:*:*
  • cpe:2.3:a:auth0:nextjs-auth0:1.6.1:*:*:*:*:node.js:*:*
    cpe:2.3:a:auth0:nextjs-auth0:1.6.1:*:*:*:*:node.js:*:*
CVSS
Base: 5.8 (as of 22-12-2021 - 03:31)
Impact:
Exploitability:
CWE CWE-601
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
Last major update 22-12-2021 - 03:31
Published 16-12-2021 - 19:15
Last modified 22-12-2021 - 03:31
Back to Top