Auth0 angular-jwt misinterprets allowlist as regex
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Oct 19, 2023
Description
Published by the National Vulnerability Database
Jun 19, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Oct 19, 2023
Last updated
Oct 19, 2023
Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the
jwtInterceptorProvider.whiteListedDomains
setting to bypass the domain allowlist filter via a crafted domain.For example, if the setting is initialized with:
jwtInterceptorProvider.whiteListedDomains = ['whitelisted.Example.com'];
An attacker can set up a domain
whitelistedXexample.com
that will pass the allow list filter, as it considers the.
separator to be a regex whildcard which matches any character.References