GHSA-c7hr-j4mj-j2w6

Suggest an improvement
Source
https://github.com/advisories/GHSA-c7hr-j4mj-j2w6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-c7hr-j4mj-j2w6/GHSA-c7hr-j4mj-j2w6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c7hr-j4mj-j2w6
Aliases
  • CVE-2015-9235
Related
Published
2018-10-09T00:38:30Z
Modified
2026-02-04T02:13:53.680951Z
Summary
Verification Bypass in jsonwebtoken
Details

Versions 4.2.1 and earlier of jsonwebtoken are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.

Recommendation

Update to version 4.2.2 or later.

Database specific
{
    "github_reviewed_at": "2020-06-16T21:30:27Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed": true,
    "nvd_published_at": null
}
References

Affected packages

npm / jsonwebtoken

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-c7hr-j4mj-j2w6/GHSA-c7hr-j4mj-j2w6.json"