Miggo Logo

CVE-2024-22206: @clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.49671%
Published
1/12/2024
Updated
1/15/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
@clerk/nextjsnpm>= 4.7.0, < 4.29.34.29.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerable functions are identified based on the descriptions provided, which directly mention auth() and getAuth() as the functions related to the IDOR vulnerability in the @clerk/nextjs package. The exact file paths are not provided, but the functions are part of the @clerk/nextjs package.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Un*ut*oriz** ****ss or privil*** *s**l*tion *u* to * lo*i* *l*w in `*ut*()` in t** *pp Rout*r or `**t*ut*()` in t** P***s Rout*r. ### *****t** V*rsions *ll *ppli**tions t**t t**t us* `@*l*rk/n*xtjs` v*rsions in t** r*n** o* `>= *.*.*`,`<

Reasoning

T** vuln*r**l* *un*tions *r* i**nti*i** **s** on t** **s*riptions provi***, w*i** *ir**tly m*ntion `*ut*()` *n* `**t*ut*()` *s t** *un*tions r*l*t** to t** I*OR vuln*r**ility in t** `@*l*rk/n*xtjs` p**k***. T** *x**t *il* p*t*s *r* not provi***, *ut