CVE-2022-24858
19.04.2022, 23:15
next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
Vendor | Product | Version |
---|---|---|
nextauth.js | next-auth | 3.0.0 ≤ 𝑥 < 3.29.2 |
nextauth.js | next-auth | 4.0.0 ≤ 𝑥 < 4.3.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-290 - Authentication Bypass by SpoofingThis attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
References