Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-1010161

Опубликовано: 25 июл. 2019
Источник: debian
EPSS Низкий

Описание

perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcrypt-jwt-perlnot-affectedpackage

Примечания

  • https://github.com/DCIT/perl-Crypt-JWT/issues/3#issuecomment-417947483

EPSS

Процентиль: 46%
0.0023
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.

CVSS3: 9.8
nvd
больше 6 лет назад

perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.

CVSS3: 9.8
github
больше 3 лет назад

perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.

EPSS

Процентиль: 46%
0.0023
Низкий
Уязвимость CVE-2019-1010161