auth0-js

Auth0 headless browser sdk

Version: 2.0.1 registry icon
Safety score
50
Check your open source dependency risks. Get immediate insight about security, stability and licensing risks.
Security Risks of Known Vulnerabilities
CVE-2018-6873
CWE-287
Threat level: CRITICAL | CVSS score: 9.8

The Auth0 authentication service before 2017-10-15 allows privilege escalation because the JWT audience is not validated.



CVE-2018-6874
CWE-352
Threat level: HIGH | CVSS score: 8.8

CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.



CVE-2020-15125
CWE-209
Threat level: HIGH | CVSS score: 7.7

In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API



Please note that this component is affected by another vulnerability
0 High  |  1 Medium  |  0 Low  |  0 Suggest

Latest safe major: 9.20.1 Scan your application codebase with Meterian to see all known vulnerabilities in your open source software dependencies.


Stability

Stay updated with the latest patches and releases. Plan your sofware desisgn. Avoid common known vulnerabilities fixed by the open source community

Latest patch release:   2.0.18

Latest minor release:   2.3.0

Latest major release:   9.20.1

Licensing

Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.

MIT   -   MIT License

Not a wildcard

Not proprietary

OSI Compliant