Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5pq9-5mpr-jj85

Опубликовано: 13 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

Jervis Has a JWT Algorithm Confusion Vulnerability

Vulnerability

https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L244-L249

The code doesn't validate that the JWT header specifies "alg":"RS256".

Impact

Depending on the broader system, this could allow JWT forgery.

Internally this severity is low since JWT is only intended to interface with GitHub. External users should consider severity moderate.

Patches

Jervis patch will explicitly verify the algorithm in the header matches expectations and further verify the JWT structure.

Upgrade to Jervis 2.2.

Workarounds

External users should consider using an alternate JWT library or upgrade.

References

Пакеты

Наименование

net.gleske:jervis

maven
Затронутые версииВерсия исправления

< 2.2

2.2

EPSS

Процентиль: 3%
0.00017
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 5.3
nvd
24 дня назад

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the code doesn't validate that the JWT header specifies "alg":"RS256". This vulnerability is fixed in 2.2.

EPSS

Процентиль: 3%
0.00017
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-347