-
-
Notifications
You must be signed in to change notification settings - Fork 32
Description
Vulnerable Library - passport-google-oauth20-2.0.0.tgz
Path to dependency file: /components/discovery/yarn.lock
Path to vulnerable library: /components/discovery/yarn.lock
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (passport-google-oauth20 version) | Remediation Available | |
|---|---|---|---|---|---|---|
| CVE-2021-41580 | 5.3 | passport-oauth2-1.5.0.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
CVE-2021-41580
Vulnerable Library - passport-oauth2-1.5.0.tgz
OAuth 2.0 authentication strategy for Passport.
Library home page: https://registry.npmjs.org/passport-oauth2/-/passport-oauth2-1.5.0.tgz
Path to dependency file: /components/discovery/yarn.lock
Path to vulnerable library: /components/discovery/yarn.lock
Dependency Hierarchy:
- passport-google-oauth20-2.0.0.tgz (Root Library)
- ❌ passport-oauth2-1.5.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
** DISPUTED ** The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
Publish Date: 2021-09-27
URL: CVE-2021-41580
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41580
Release Date: 2021-09-27
Fix Resolution: passport-oauth2 - 1.6.1
Step up your Open Source Security Game with Mend here