Skip to content

@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

Critical severity GitHub Reviewed Published Jan 12, 2024 in clerk/javascript • Updated Jan 15, 2024

Package

npm @clerk/nextjs (npm)

Affected versions

>= 4.7.0, < 4.29.3

Patched versions

4.29.3

Description

Impact

Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router.

Affected Versions

All applications that that use @clerk/nextjs versions in the range of >= 4.7.0,< 4.29.3 in a Next.js backend to authenticate API Routes, App Router, or Route handlers. Specifically, those that call auth() in the App Router or getAuth() in the Pages Router. Only the @clerk/nextjs SDK is impacted. Other SDKs, including other Javascript-based SDKs, are not impacted.

Patches

Fix included in @clerk/nextjs@4.29.3.

References

References

@zythosec zythosec published to clerk/javascript Jan 12, 2024
Published by the National Vulnerability Database Jan 12, 2024
Published to the GitHub Advisory Database Jan 12, 2024
Reviewed Jan 12, 2024
Last updated Jan 15, 2024

Severity

Critical
9.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2024-22206

GHSA ID

GHSA-q6w5-jg5q-47vg

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.