一、 漏洞 CVE-2022-39263 基础信息
漏洞标题
"NextAuth.js Upstash Adapter 缺少令牌验证"
来源:AIGC 神龙大模型
漏洞描述信息
NextAuth.js Upstash Adapter缺少令牌验证
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
NextAuth.js Upstash Adapter missing token verification
来源:美国国家漏洞数据库 NVD
漏洞描述信息
`@next-auth/upstash-redis-adapter` is the Upstash Redis adapter for NextAuth.js, which provides authentication for Next.js. Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected by this vulnerability. The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email callback flow. An attacker who knows about the victim's email could easily sign in as the victim, given the attacker also knows about the verification token's expired duration. The vulnerability is patched in v3.0.2. A workaround is available. Using Advanced Initialization, developers can check the requests and compare the query's token and identifier before proceeding.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
来源:美国国家漏洞数据库 NVD
漏洞类别
认证机制不恰当
来源:美国国家漏洞数据库 NVD
漏洞标题
NextAuth.js 授权问题漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
NextAuth.js是 Next.js 的身份验证。 NextAuth.js v3.0.2 版本存在授权问题漏洞,该漏洞源于Upstash Redis 适配器实现不检查标识符(电子邮件)和令牌,而仅在验证电子邮件回调流中的令牌时检查标识符。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
授权问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2022-39263 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2022-39263 的情报信息