Логотип exploitDog
bind:CVE-2025-59420
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59420

Количество 5

Количество 5

ubuntu логотип

CVE-2025-59420

3 месяца назад

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-59420

3 месяца назад

No description is available for this CVE.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-59420

3 месяца назад

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-59420

3 месяца назад

Authlib is a Python library which builds OAuth and OpenID Connect serv ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-9ggr-2464-2j32

3 месяца назад

Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-59420

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.

CVSS3: 7.5
0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-59420

No description is available for this CVE.

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-59420

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-59420

Authlib is a Python library which builds OAuth and OpenID Connect serv ...

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-9ggr-2464-2j32

Authlib: JWS/JWT accepts unknown crit headers (RFC violation → possible authz bypass)

CVSS3: 7.5
0%
Низкий
3 месяца назад

Уязвимостей на страницу