Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2020-15125 | First vendor Publication | 2020-07-29 |
Vendor | Cve | Last vendor Modification | 2021-04-28 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 7.7 | ||
Base Score | 7.7 | Environmental Score | 7.7 |
impact SubScore | 4 | Temporal Score | 7.7 |
Exploitabality Sub Score | 3.1 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Changed | Confidentiality Impact | High |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15125 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-209 | Information Exposure Through an Error Message |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-06-24 12:35:32 |
|
2021-05-04 13:45:44 |
|
2021-04-22 02:57:45 |
|
2020-08-04 00:22:52 |
|
2020-07-29 21:23:15 |
|