jwt-go allows attackers to bypass intended access restrictions in situations with []string{}
for m["aud"]
(which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1
{ "nvd_published_at": "2020-09-30T18:15:00Z", "cwe_ids": [ "CWE-287", "CWE-755" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-05-18T20:54:59Z" }