Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c7hr-j4mj-j2w6

Опубликовано: 09 окт. 2018
Источник: github
Github: Прошло ревью

Описание

Verification Bypass in jsonwebtoken

Versions 4.2.1 and earlier of jsonwebtoken are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.

Recommendation

Update to version 4.2.2 or later.

Пакеты

Наименование

jsonwebtoken

npm
Затронутые версииВерсия исправления

< 4.2.2

4.2.2

EPSS

Процентиль: 97%
0.3247
Средний

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.3
redhat
почти 8 лет назад

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

CVSS3: 9.8
nvd
больше 7 лет назад

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

EPSS

Процентиль: 97%
0.3247
Средний

Дефекты

CWE-20