Логотип exploitDog
bind:CVE-2020-15240
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15240

Количество 4

Количество 4

ubuntu логотип

CVE-2020-15240

больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-15240

больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2020-15240

больше 5 лет назад

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly val ...

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-58r4-h6v8-jcvm

больше 5 лет назад

Regression in JWT Signature Validation

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-15240

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-15240

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.

CVSS3: 7.4
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-15240

omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly val ...

CVSS3: 7.4
0%
Низкий
больше 5 лет назад
github логотип
GHSA-58r4-h6v8-jcvm

Regression in JWT Signature Validation

CVSS3: 7.4
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу