Логотип exploitDog
bind:"CVE-2024-51744"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-51744"

Количество 12

Количество 12

ubuntu логотип

CVE-2024-51744

около 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
EPSS: Низкий
redhat логотип

CVE-2024-51744

около 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2024-51744

около 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviou

CVSS3: 3.1
EPSS: Низкий
msrc логотип

CVE-2024-51744

12 месяцев назад

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2024-51744

около 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear document ...

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0131-1

9 месяцев назад

Security update for coredns

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0546-1

11 месяцев назад

Security update golang-github-prometheus-prometheus

EPSS: Низкий
github логотип

GHSA-29wx-vh33-7x7r

около 1 года назад

Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1333-1

9 месяцев назад

Security update for cosign

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0525-1

11 месяцев назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4042-1

около 1 года назад

Security update for govulncheck-vulndb

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20117-1

около 2 месяцев назад

Security update for trivy

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviou

CVSS3: 3.1
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 3.1
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear document ...

CVSS3: 3.1
0%
Низкий
около 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:0131-1

Security update for coredns

0%
Низкий
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0546-1

Security update golang-github-prometheus-prometheus

0%
Низкий
11 месяцев назад
github логотип
GHSA-29wx-vh33-7x7r

Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations

CVSS3: 3.1
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:1333-1

Security update for cosign

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0525-1

Security update for SUSE Manager Client Tools

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4042-1

Security update for govulncheck-vulndb

около 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:20117-1

Security update for trivy

около 2 месяцев назад

Уязвимостей на страницу