Логотип exploitDog
bind:CVE-2024-51744
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-51744

Количество 13

Количество 13

ubuntu логотип

CVE-2024-51744

больше 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
EPSS: Низкий
redhat логотип

CVE-2024-51744

больше 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2024-51744

больше 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviou

CVSS3: 3.1
EPSS: Низкий
msrc логотип

CVE-2024-51744

около 1 года назад

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2024-51744

больше 1 года назад

golang-jwt is a Go implementation of JSON Web Tokens. Unclear document ...

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0131-1

10 месяцев назад

Security update for coredns

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0546-1

12 месяцев назад

Security update golang-github-prometheus-prometheus

EPSS: Низкий
github логотип

GHSA-29wx-vh33-7x7r

больше 1 года назад

Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20099-1

16 дней назад

Security update for coredns

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1333-1

10 месяцев назад

Security update for cosign

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0525-1

12 месяцев назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4042-1

около 1 года назад

Security update for govulncheck-vulndb

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20117-1

2 месяца назад

Security update for trivy

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behav...

CVSS3: 3.1
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviou

CVSS3: 3.1
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 3.1
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-51744

golang-jwt is a Go implementation of JSON Web Tokens. Unclear document ...

CVSS3: 3.1
0%
Низкий
больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:0131-1

Security update for coredns

0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0546-1

Security update golang-github-prometheus-prometheus

0%
Низкий
12 месяцев назад
github логотип
GHSA-29wx-vh33-7x7r

Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations

CVSS3: 3.1
0%
Низкий
больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2026:20099-1

Security update for coredns

16 дней назад
suse-cvrf логотип
SUSE-SU-2025:1333-1

Security update for cosign

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0525-1

Security update for SUSE Manager Client Tools

12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4042-1

Security update for govulncheck-vulndb

около 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:20117-1

Security update for trivy

2 месяца назад

Уязвимостей на страницу