Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-9235

Опубликовано: 31 мар. 2018
Источник: redhat
CVSS3: 7.3

Описание

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4nodejs-jsonwebtokenNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1584880nodejs-jsonwebtoken: verification step bypass with an altered token

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

github
больше 7 лет назад

Verification Bypass in jsonwebtoken

7.3 High

CVSS3