CVE-2018-11537 – angular-jwt
Package
Manager: npm
Name: angular-jwt
Vulnerable Version: >=0 <0.1.10
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00463 pctl0.63348
Details
Auth0 angular-jwt misinterprets allowlist as regex Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the `jwtInterceptorProvider.whiteListedDomains` setting to bypass the domain allowlist filter via a crafted domain. For example, if the setting is initialized with: `jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];` An attacker can set up a domain `whitelistedXexample.com` that will pass the allow list filter, as it considers the `.` separator to be a regex whildcard which matches any character.
Metadata
Created: 2022-05-14T03:05:44Z
Modified: 2023-10-19T18:21:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vm2p-f5j4-mj6g/GHSA-vm2p-f5j4-mj6g.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-vm2p-f5j4-mj6g
Finding: F184
Auto approve: 1