漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
NextAuth.js Upstash Adapter missing token verification
Vulnerability Description
`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
认证机制不恰当
Vulnerability Title
NextAuth.js 授权问题漏洞
Vulnerability Description
NextAuth.js是 Next.js 的身份验证。 NextAuth.js v3.0.2 版本存在授权问题漏洞,该漏洞源于Upstash Redis 适配器实现不检查标识符(电子邮件)和令牌,而仅在验证电子邮件回调流中的令牌时检查标识符。
CVSS Information
N/A
Vulnerability Type
N/A