Overview
Versions before and including11.30.0 are vulnerable to a reflected XSS. An attacker can execute arbitrary code when either:
- The library’s
flashMessagefeature is used and user input or data from URL parameters is incorporated into theflashMessage.
- The library’s
languageDictionaryfeature is used and user input or data from URL parameters is incorporated into thelanguageDictionary.
Am I affected?
This vulnerability affects you if your implementation fits either of these descriptions:flashMessage vulnerability
If all of these conditions are true, you’re vulnerable:- You use
auth0-lockversion11.30.0or older. - You use the
flashMessagefeature. - User input or data from URL parameters is incorporated into the
flashMessage.
text property of a flashMessage:
languageDictionary vulnerability
If all of these conditions are true, you’re vulnerable:- You use
auth0-lockversion11.30.0or older. - You use the
languageDictionaryfeature. - User input or data from URL parameters is used in
languageDictionaryproperties.
socialLoginInstructions property of a languageDictionary:
How to fix that?
Upgrade toauth0-lock version 11.30.1.
Will this update impact my users?
The fix uses DOMPurify to sanitize theflashMessage and languageDictionary inputs. It removes any JavaScript in these fields, such as script tags or onclick attributes.