Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15240

Опубликовано: 21 окт. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 5.8
CVSS3: 7.4

Описание

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the jwt_validator.verify method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using omniauth-auth0. 2. You are using JWTValidator.verify method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

3.1.0-2
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-infra-legacy/trusty

DNE

focal

not-affected

code not present
groovy

not-affected

code not present
hirsute

not-affected

code not present
impish

not-affected

code not present

Показывать по

5.8 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
debian
больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly val ...

CVSS3: 7.4
github
больше 5 лет назад

Regression in JWT Signature Validation

5.8 Medium

CVSS2

7.4 High

CVSS3