Skip to content

Conversation

@vlaurin
Copy link
Contributor

@vlaurin vlaurin commented May 9, 2024

As per specs (https://www.oauth.com/oauth2-servers/access-tokens/client-credentials/), only grant_type is required, client_id is not a valid parameter.

As per specs (https://www.oauth.com/oauth2-servers/access-tokens/client-credentials/), only `grant_type` is required, `client_id` is not a valid parameter.
@vlaurin vlaurin force-pushed the fix/oauth2-client-creds branch from 7545a27 to 49c7b39 Compare May 9, 2024 09:39
axios  1.0.0 - 1.5.1
Severity: moderate
Axios Cross-Site Request Forgery Vulnerability - GHSA-wf5p-g6vw-rhxx
fix available via `npm audit fix`
node_modules/axios

follow-redirects  <=1.15.5
Severity: moderate
Follow Redirects improperly handles URLs in the url.parse() function - GHSA-jchw-25xp-jwwc
follow-redirects' Proxy-Authorization header kept across hosts - GHSA-cxjh-pqwp-8mfp
fix available via `npm audit fix`
node_modules/follow-redirects

jose  <2.0.7
Severity: moderate
jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext - GHSA-hhhv-q57g-882q
fix available via `npm audit fix`
node_modules/jose

semver  7.0.0 - 7.5.1
Severity: moderate
semver vulnerable to Regular Expression Denial of Service - GHSA-c2qf-rxjj-qqgw
fix available via `npm audit fix`
node_modules/jsonwebtoken/node_modules/semver
@vlaurin vlaurin merged commit 72549d7 into main May 9, 2024
@vlaurin vlaurin deleted the fix/oauth2-client-creds branch May 9, 2024 09:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants