NA

CVE-2023-48309

Published: 20/11/2023 Updated: 25/11/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

NextAuth.js provides authentication for Next.js. `next-auth` applications prior to version 4.24.5 that rely on the default Middleware authorization are affected by a vulnerability. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issued JWT from an interrupted OAuth sign-in flow (state, PKCE or nonce). Manually overriding the `next-auth.session-token` cookie value with this non-related JWT would let the user simulate a logged in user, albeit having no user information associated with it. (The only property on this user is an opaque randomly generated string). This vulnerability does not give access to other users' data, neither to resources that require proper authorization via scopes or other means. The created mock user has no information associated with it (ie. no name, email, access_token, etc.) This vulnerability can be exploited by bad actors to peek at logged in user states (e.g. dashboard layout). `next-auth` `v4.24.5` contains a patch for the vulnerability. As a workaround, using a custom authorization callback for Middleware, developers can manually do a basic authentication.

Vulnerable Product Search on Vulmon Subscribe to Product

nextauth.js next-auth

Github Repositories

CVEs Proof-of-Concept

CVE Findings Repository Introduction Welcome to my CVE Findings repository Here, I document and discuss various Common Vulnerabilities and Exposures (CVEs) that I have discovered My goal is to contribute to the cybersecurity community by providing detailed insights and potential mitigation strategies for these vulnerabilities For each CVE, there is a separate directory conta

Tech Stack File HarshKanjiya/talkative-nextjs 26Tools used 12/19/23 Report generated Languages (3) CSS 3 JavaScript TypeScript Frameworks (6) Autoprefixer Nextjs v1343 Nodejs PostCSS React v1820 Tailwind CSS Da