Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
auth: Patreon provider assigns the same local user ID to every authenticated Patreon account, enabling cross‑user impersonation
Vulnerability Description
auth provides authentication via oauth2, direct and email. From versions 1.18.0 to before 1.25.2 and 2.0.0 to before 2.1.2, the Patreon OAuth provider maps every authenticated Patreon account to the same local user.ID, instead of deriving a unique ID from the Patreon account returned by Patreon. In practice, this means all Patreon-authenticated users of an application using this library are collapsed into a single local identity. Any application that trusts token.User.ID as the stable account key can end up mixing or fully merging unrelated Patreon users, which can lead to cross-account access, privilege confusion, and subscription-state leakage. This issue has been patched in versions 1.25.2 and 2.1.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
认证机制不恰当
Vulnerability Title
Auth 授权问题漏洞
Vulnerability Description
Auth是Supabase开源的一个用户认证与管理系统。 Auth 1.18.0版本至1.25.2之前版本和2.0.0版本至2.1.2之前版本存在授权问题漏洞,该漏洞源于Patreon OAuth提供程序将所有经过身份验证的Patreon账户映射到同一个本地用户ID,可能导致跨账户访问、权限混淆和订阅状态泄露。
CVSS Information
N/A
Vulnerability Type
N/A