Описание
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Ссылки
- Broken LinkVendor Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Broken LinkVendor Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.2.2 (исключая)
cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 97%
0.3247
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20
CWE-327
Связанные уязвимости
CVSS3: 7.3
redhat
почти 8 лет назад
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
EPSS
Процентиль: 97%
0.3247
Средний
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-20
CWE-327