Описание
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.
Ссылки
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Release NotesThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.15.0 (включая) до 1.15.1 (исключая)
cpe:2.3:a:styria:django-rest-framework-json_web_tokens:*:*:*:*:*:*:*:*
EPSS
Процентиль: 58%
0.00368
Низкий
9.1 Critical
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 9.1
github
больше 5 лет назад
Django Rest Framework jwt allows obtaining new token from notionally invalidated token
EPSS
Процентиль: 58%
0.00368
Низкий
9.1 Critical
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-287