Логотип exploitDog
bind:CVE-2016-10555
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-10555

Количество 2

Количество 2

nvd логотип

CVE-2016-10555

больше 7 лет назад

Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.

CVSS3: 6.5
EPSS: Высокий
github логотип

GHSA-vgrx-w6rg-8fqf

больше 7 лет назад

Forgeable Public/Private Tokens in jwt-simple

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-10555

Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.

CVSS3: 6.5
82%
Высокий
больше 7 лет назад
github логотип
GHSA-vgrx-w6rg-8fqf

Forgeable Public/Private Tokens in jwt-simple

82%
Высокий
больше 7 лет назад

Уязвимостей на страницу