GHSA-58r4-h6v8-jcvm

Suggest an improvement
Source
https://github.com/advisories/GHSA-58r4-h6v8-jcvm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/11/GHSA-58r4-h6v8-jcvm/GHSA-58r4-h6v8-jcvm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-58r4-h6v8-jcvm
Aliases
Published
2020-11-03T02:31:38Z
Modified
2023-11-08T04:02:34.983488Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Regression in JWT Signature Validation
Details

Overview

Versions after and including 2.3.0 are improperly validating the JWT token signature when using the JWTValidator.verify method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

  • You are using omniauth-auth0.
  • You are using JWTValidator.verify method directly OR you are not authenticating using the SDK’s default Authorization Code Flow.

How to fix that?

Upgrade to version 2.4.1.

Will this update impact my users?

The fix provided in this version will not affect your users.

Database specific
{
    "nvd_published_at": "2020-10-21T18:15:00Z",
    "cwe_ids": [
        "CWE-287",
        "CWE-347"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-10-27T19:10:29Z"
}
References

Affected packages

RubyGems / omniauth-auth0

Package

Name
omniauth-auth0
Purl
pkg:gem/omniauth-auth0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.4.1

Affected versions

2.*

2.3.0
2.3.1
2.4.0