Описание
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.
Ссылки
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.4.5 (включая)
cpe:2.3:a:authentikat-jwt_project:authentikat-jwt:*:*:*:*:*:*:*:*
EPSS
Процентиль: 60%
0.00398
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9.8
github
около 7 лет назад
Exposure of Sensitive information in authentikat-jwt
EPSS
Процентиль: 60%
0.00398
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo