Логотип exploitDog
bind:CVE-2020-15084
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15084

Количество 2

Количество 2

nvd логотип

CVE-2020-15084

больше 5 лет назад

In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this vulnerability if all of the following conditions apply: - You are using express-jwt - You do not have **algorithms** configured in your express-jwt configuration. - You are using libraries such as jwks-rsa as the **secret**. You can fix this by specifying **algorithms** in the express-jwt configuration. See linked GHSA for example. This is also fixed in version 6.0.0.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-6g6m-m6h5-w9gf

больше 5 лет назад

Authorization bypass in express-jwt

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15084

In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this vulnerability if all of the following conditions apply: - You are using express-jwt - You do not have **algorithms** configured in your express-jwt configuration. - You are using libraries such as jwks-rsa as the **secret**. You can fix this by specifying **algorithms** in the express-jwt configuration. See linked GHSA for example. This is also fixed in version 6.0.0.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
github логотип
GHSA-6g6m-m6h5-w9gf

Authorization bypass in express-jwt

CVSS3: 7.7
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу