Miggo Logo

CVE-2020-15125: Authorization header is not sanitized in an error object in auth0

7.7

CVSS Score
3.1

Basic Information

EPSS Score
0.53532%
Published
7/29/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
auth0npm< 2.27.12.27.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from incomplete key sanitization in error handling. The commit diff shows:

  1. The regex pattern in sanitizeErrors() was expanded from 'password|secret' to 'password|secret|authorization'
  2. sanitizeErrorRequestData() was modified to process both _data and _header properties
  3. Tests were added specifically for authorization header sanitization These functions were vulnerable because they used a blocklist approach that omitted authorization headers prior to v2.27.1, violating CWE-209 by exposing credentials in error messages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Ov*rvi*w V*rsions ***or* *n* in*lu*in* `*.**.*` us* * *lo*k list o* sp**i*i* k*ys t**t s*oul* ** s*nitiz** *rom t** r*qu*st o*j**t *ont*in** in t** *rror o*j**t. W**n * r*qu*st to *ut** m*n***m*nt *PI **ils, t** k*y *or `*ut*oriz*tion` *****r is

Reasoning

T** vuln*r**ility st*mm** *rom in*ompl*t* k*y s*nitiz*tion in *rror **n*lin*. T** *ommit *i** s*ows: *. T** r***x p*tt*rn in s*nitiz**rrors() w*s *xp*n*** *rom 'p*sswor*|s**r*t' to 'p*sswor*|s**r*t|*ut*oriz*tion' *. s*nitiz**rrorR*qu*st**t*() w*s mo*