Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15240

Опубликовано: 21 окт. 2020
Источник: debian
EPSS Низкий

Описание

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-omniauth-auth0not-affectedpackage

Примечания

  • https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm

EPSS

Процентиль: 25%
0.00087
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
nvd
больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
github
больше 5 лет назад

Regression in JWT Signature Validation

EPSS

Процентиль: 25%
0.00087
Низкий