fix: Auth provider validation bypass on login via partial authData (GHSA-pfj7-wv7c-22pr)#10246
Conversation
|
🚀 Thanks for opening this pull request! We appreciate your effort in improving the project. Please let us know once your pull request is ready for review. Tip
Note Please respond to review comments from AI agents just like you would to comments from a human reviewer. Let the reviewer resolve their own comments, unless they have reviewed and accepted your commit, or agreed with your explanation for why the feedback was incorrect. Caution Pull requests must be written using an AI agent with human supervision. Pull requests written entirely by a human will likely be rejected, because of lower code quality, higher review effort and the higher risk of introducing bugs. Please note that AI review comments on this pull request alone do not satisfy this requirement. |
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
📝 WalkthroughWalkthroughDeprecates the Changes
Sequence Diagram(s)sequenceDiagram
participant Client as Client
participant Server as RestWrite
participant Auth as Auth.handleAuthDataValidation
participant Adapter as AuthAdapter.validateAuthData
participant DB as User/Database
Client->>Server: POST /login (authData)
Server->>Auth: validateAuthData(authData) %% rgba(100,149,237,0.5)
Auth->>Adapter: validateAuthData(provider, authData) %% rgba(60,179,113,0.5)
Adapter-->>Auth: validation result
Auth-->>Server: validation outcome
alt valid
Server->>DB: findOrCreate/update user
DB-->>Server: user record
Server-->>Client: 200 OK + session
else invalid
Server-->>Client: 400/401 error
end
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Possibly related PRs
🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@src/Deprecator/Deprecations.js`:
- Around line 79-83: The option metadata for allowExpiredAuthDataToken is
missing the deprecation notice in its help text; open the option definition for
allowExpiredAuthDataToken in Options/index.js and append the runtime deprecation
message used in Deprecator/Deprecations.js ("This option has a limited effect
since auth providers are now always validated on login...") following the same
format used by enableInsecureAuthAdapters and mountPlayground, then run npm run
definitions to regenerate src/Options/Definitions.js and src/Options/docs.js so
the docs and definitions include the deprecation text.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 0b8e7520-a594-4c6a-b5a7-e180f1ff922b
📒 Files selected for processing (4)
DEPRECATIONS.mdspec/vulnerabilities.spec.jssrc/Deprecator/Deprecations.jssrc/RestWrite.js
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## alpha #10246 +/- ##
=======================================
Coverage 92.60% 92.60%
=======================================
Files 192 192
Lines 16358 16358
Branches 201 201
=======================================
Hits 15148 15148
Misses 1193 1193
Partials 17 17 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
# [9.6.0-alpha.41](9.6.0-alpha.40...9.6.0-alpha.41) (2026-03-19) ### Bug Fixes * Auth provider validation bypass on login via partial authData ([GHSA-pfj7-wv7c-22pr](GHSA-pfj7-wv7c-22pr)) ([#10246](#10246)) ([98f4ba5](98f4ba5))
|
🎉 This change has been released in version 9.6.0-alpha.41 |
Issue
Auth provider validation bypass on login via partial authData (GHSA-pfj7-wv7c-22pr)