Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-23529

Опубликовано: 21 дек. 2022
Источник: redhat
CVSS3: 0

Описание

A flaw was found in the jsonwebtoken package. In affected versions of the jsonwebtoken library, if a malicious actor can modify the key retrieval parameter (referring to the secretOrPublicKey argument from the readme link) of the jwt.verify() function, they can perform remote code execution (RCE).

Отчет

Red Hat Product Security does not consider this to be a vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 4openshift4/ose-consoleNot affected
Red Hat Openshift Container Storage 4ocs4/mcg-core-rhel8Not affected
Red Hat Openshift Data Foundation 4noobaa-core-containerNot affected
Red Hat Openshift Data Foundation 4odf4/mcg-core-rhel9Not affected

Показывать по

Дополнительная информация

Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2159911jsonwebtoken: Insecure input validation in jwt.verify function

0 Low

CVSS3

Связанные уязвимости

nvd
больше 2 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none.

CVSS3: 7.6
github
больше 2 лет назад

jsonwebtoken has insecure input validation in jwt.verify function

0 Low

CVSS3