CVE-2020-15125: Authorization header is not sanitized in an error object in auth0
7.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53532%
CWE
Published
7/29/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
auth0 | npm | < 2.27.1 | 2.27.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from incomplete key sanitization in error handling. The commit diff shows:
- The regex pattern in sanitizeErrors() was expanded from 'password|secret' to 'password|secret|authorization'
- sanitizeErrorRequestData() was modified to process both _data and _header properties
- Tests were added specifically for authorization header sanitization These functions were vulnerable because they used a blocklist approach that omitted authorization headers prior to v2.27.1, violating CWE-209 by exposing credentials in error messages.