Описание
Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
Ссылки
- Broken LinkThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Broken LinkThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.3.0 (включая)
cpe:2.3:a:jwt-simple_project:jwt-simple:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 99%
0.81652
Высокий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-20
CWE-310
Связанные уязвимости
EPSS
Процентиль: 99%
0.81652
Высокий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-20
CWE-310