Описание
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.0 (исключая)
cpe:2.3:a:google:firebase_php-jwt:*:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00791
Низкий
9.1 Critical
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-843
Связанные уязвимости
EPSS
Процентиль: 73%
0.00791
Низкий
9.1 Critical
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-843