Skip to content

Releases: iress/cloudfront-auth

v4.1.1

03 Oct 15:26
bdd68f0
Compare
Choose a tag to compare
Merge pull request #48 from iress/fix-same-site

fix: stop redirect loop caused by TOKEN cookie not sent

v4.1.0

03 Oct 14:03
f051484
Compare
Choose a tag to compare

This is a minor feature release.

Changes

  • Set SameSite cookie attribute to Lax for CV and NONCE in #47
    • This change re-enables the ability to have authentication that isn't embedded into the same site.
      e.g. changing host to Okta to log in, then back to site once authenticated.

Full Changelog: v4.0.1...v4.1.0

v4.0.1

02 Oct 15:39
59cdf41
Compare
Choose a tag to compare
Merge pull request #46 from iress/fix-aws-sdk

default runtime to nodejs16.x

v4.0.0

02 Oct 13:04
183bf6b
Compare
Choose a tag to compare

This is a major security release.

Breaking

Due to cookie attributes added, this module now only supports HTTPS and requires cookies from the same site. This change is unlikely to cause problems because authentication should already be over a secure connection.

Changes

  • HTML encoding template replacements to avoid potential cross-site scripting issue. #38
    It was found that the _callback page utilized in the authorization flow reflects potentially dangerous user input, though there a number of caveats to this that prevented the successful execution of meaningful attacks such as XSS and HTML Injection.
  • Setting SameSite cookie attribute to strict. #40 & #42
    SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information leakage. It also provides some protection against cross-site request forgery attacks.
  • Setting Secure cookie attribute. #39 & #42
    If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.
  • Include appropriate Content-Type in error responses. #44
  • Update npm dependencies to remove vulnerabilities.
    All npm audit vulnerability severities removed by updating referenced versions.
  • Update returned footer information to reference this repository instead of upstream. #43
  • Include testing against nodejs v18 (current latest nodejs version for Lambda@Edge). #41

Full Changelog: v3.3.2...v4.0.0

v3.3.2

12 Jul 23:27
f4c0e44
Compare
Choose a tag to compare
AWS provider 3.28.0

v3.3.1

15 Nov 12:44
095c614
Compare
Choose a tag to compare
Correct default logout route

v3.3.0

14 Nov 12:01
505eebe
Compare
Choose a tag to compare
Add logout route

v3.2.2

17 Oct 08:54
699dcf8
Compare
Choose a tag to compare
Remove max version constraint on provider

v3.2.1

17 Oct 05:32
5c9c396
Compare
Choose a tag to compare
Ensure permissions are deployed before the secret rotation is applied

v3.2.0

01 Dec 01:22
2b9e826
Compare
Choose a tag to compare