Overview
Versions before and including11.30.0
are vulnerable to a reflected XSS. An attacker can execute arbitrary code when either:
- The library’s
flashMessage
feature is used and user input or data from URL parameters is incorporated into theflashMessage
.
- The library’s
languageDictionary
feature is used and user input or data from URL parameters is incorporated into thelanguageDictionary
.
Am I affected?
This vulnerability affects you if your implementation fits either of these descriptions:flashMessage vulnerability
If all of these conditions are true, you’re vulnerable:- You use
auth0-lock
version11.30.0
or older. - You use the
flashMessage
feature. - User input or data from URL parameters is incorporated into the
flashMessage
.
text
property of a flashMessage
:
languageDictionary vulnerability
If all of these conditions are true, you’re vulnerable:- You use
auth0-lock
version11.30.0
or older. - You use the
languageDictionary
feature. - User input or data from URL parameters is used in
languageDictionary
properties.
socialLoginInstructions
property of a languageDictionary
:
How to fix that?
Upgrade toauth0-lock
version 11.30.1
.
Will this update impact my users?
The fix uses DOMPurify to sanitize theflashMessage
and languageDictionary
inputs. It removes any JavaScript in these fields, such as script
tags or onclick
attributes.