Auth0ƽ̨Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î £¨CVE-2018-6873£¬CVE-2018-6874£©
2018-04-10
×ÛÊö
¿ËÈÕ£¬Auth0±»ÆØ³ö±£´æÑÏÖØµÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¸ÃÎó²î£¨CVE-2018-6873£©Ô´ÓÚAuth0µÄLegacy Lock APIûÓжÔJSON Web Tokens(JWT)µÄ²ÎÊý×öºÏÀíµÄÑéÖ¤£¬Ëæºó¿ÉÒÔ´¥·¢Ò»¸öCSRF/SXRFÎó²î£¨CVE-2018-6874£©¡£¹¥»÷Õß½öÐèÒªÖªµÀÓû§µÄuser ID»òÕßemailµØµã£¬¾Í¿ÉÒԵǼ¸ÃÓû§ÈκÎʹÓÃAuth0ÑéÖ¤µÄÓ¦Óá£
Auth0ÓµÓÐ2000¶à¼ÒÆóÒµÓû§²¢ÇÒÌìÌìÖÎÀíÁè¼Ý15ÒڴεĵǼÑéÖ¤£¬ÊÇ×î´óµÄÉí·Ýƽ̨֮һ¡£ÏÖÔÚAuth0ÒѾÐû²¼¸üÐÂÐÞ¸´Á˸ÃÎó²î¡£
Ïà¹ØÁ´½Ó£º
https://securityaffairs.co/wordpress/71175/hacking/auth0-authentication-bypass.html
https://medium.com/@cintainfinita/knocking-down-the-big-door-8e2177f76ea5
ÊÜÓ°ÏìµÄ°æ±¾
l Auth0.js 9 & Lock 11 ÒÔϰ汾
²»ÊÜÓ°ÏìµÄ°æ±¾
l Auth0.js 9 & Lock 11
½â¾ö¼Æ»®
Auth0¹Ù·½ÒѾÐû²¼Í¨¸æËµÃ÷ÎúÉÏÊöÎó²î²¢ÇÒÒÑÐû²¼Ð°汾£¬ÇëÊÜÓ°ÏìµÄÓû§¾¡¿ìƾ֤¹Ù·½µÄÖ¸µ¼¸üÐÂÉý¼¶£¬¾ÙÐзÀ»¤¡£
²»Àû±ãÉý¼¶µÄÓû§¿ÉÒÔ½ÓÄÉÒÔϲ½·¥ÔÝʱ¾ÙÐзÀ»¤£º
1. ¹ØÓÚCVE-2018-6874£¬Óû§¿ÉÒÔ½«·þÎñÖÎÀíÃæ°åÖеÄLegacy Lock API flagÉèÖÃΪoff£¬ÕâÑù»áʹµÃ¿çÓòÑéÖ¤£¨cross-domain authentication£©Ê§Ð§£¬µ«/loginÉϵÄÈ«¾ÖµÇ¼£¨Universal Login page£©ÈÔÈ»ÓÐÓá£
2. ¹Ù·½ÍƼöʹÓöàÒòËØÉí·ÝÑéÖ¤¹¦Ð§£¨Multifactor authentication£©Ê¹Óøù¦Ð§µÄÓû§²¢²»»áÊÜÉÏÊöÎó²îµÄÓ°Ïì¡£
²Î¿¼Á´½Ó£º
https://auth0.com/blog/managing-and-mitigating-security-vulnerabilities-at-auth0/
Éù Ã÷
±¾Ç徲ͨ¸æ½öÓÃÀ´ÐÎò¿ÉÄܱ£´æµÄÇå¾²ÎÊÌ⣬¾ÅÓÎÀÏ¸ç¿Æ¼¼²»Îª´ËÇ徲ͨ¸æÌṩÈκΰü¹Ü»òÔÊÐí¡£ÓÉÓÚÈö²¥¡¢Ê¹ÓôËÇ徲ͨ¸æËùÌṩµÄÐÅÏ¢¶øÔì³ÉµÄÈκÎÖ±½Ó»òÕß¼ä½ÓµÄЧ¹û¼°Ëðʧ£¬¾ùÓÉʹÓÃÕß×Ô¼ºÈÏÕæ£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼ÒÔ¼°Ç徲ͨ¸æ×÷Õß²»Îª´Ë¼ç¸ºÈκÎÔðÈΡ£¾ÅÓÎÀÏ¸ç¿Æ¼¼ÓµÓжԴËÇ徲ͨ¸æµÄÐÞ¸ÄÏ¢ÕùÊÍȨ¡£ÈçÓû×ªÔØ»òÈö²¥´ËÇ徲ͨ¸æ£¬±ØÐè°ü¹Ü´ËÇ徲ͨ¸æµÄÍêÕûÐÔ£¬°üÀ¨°æÈ¨ÉùÃ÷µÈËùÓÐÄÚÈÝ¡£Î´¾¾ÅÓÎÀÏ¸ç¿Æ¼¼ÔÊÐí£¬²»µÃí§ÒâÐ޸ĻòÕßÔö¼õ´ËÇ徲ͨ¸æÄÚÈÝ£¬²»µÃÒÔÈκη½·¨½«ÆäÓÃÓÚÉÌҵĿµÄ¡£

¾ÅÓÎÀϸçÔÆ





