Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-0114

Опубликовано: 04 янв. 2018
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Высокий

Описание

A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cisco:node-jose:*:*:*:*:*:*:*:*
Версия до 0.11.0 (исключая)

EPSS

Процентиль: 99%
0.84691
Высокий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-347
CWE-347

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Cisco node-jose improper validation of JWT signature

EPSS

Процентиль: 99%
0.84691
Высокий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-347
CWE-347