Improper Authentication in Upstash Redis adapter - CVE-2022-39263
Published: September 29, 2022
Upstash Redis adapter
NextAuth.js
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to Upstash Redis adapter does not properly authenticate user sessions. After the initial successful authentication performed with a valid user identifier (email) and a token, all other subsequent requests are authenticated only by using the user identifier. A remote attacker with knowledge of an existing email address can bypass authentication process and gain unauthorized access to the application.