GHSA-vgrx-w6rg-8fqf

Suggest an improvement
Source
https://github.com/advisories/GHSA-vgrx-w6rg-8fqf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/11/GHSA-vgrx-w6rg-8fqf/GHSA-vgrx-w6rg-8fqf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vgrx-w6rg-8fqf
Aliases
Published
2018-11-06T23:12:07Z
Modified
2023-11-08T03:58:12.325695Z
Summary
Forgeable Public/Private Tokens in jwt-simple
Details

Affected versions of the jwt-simple package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.

Recommendation

Update to version 0.3.1 or later.

Additionally, be sure to always specify an algorithm in calls to .decode().

Database specific
{
    "severity": "CRITICAL",
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-16T21:57:45Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed": true
}
References

Affected packages

npm / jwt-simple

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/11/GHSA-vgrx-w6rg-8fqf/GHSA-vgrx-w6rg-8fqf.json"