CVE-2020-26160 – github.com/dgrijalva/jwt-go
Package
Manager: go
Name: github.com/dgrijalva/jwt-go
Vulnerable Version: >=0.0.0-20150717181359-44718f8a89b0 <=3.2.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00066 pctl0.20758
Details
Authorization bypass in github.com/dgrijalva/jwt-go jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1
Metadata
Created: 2021-05-18T21:08:21Z
Modified: 2024-05-20T19:26:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-w73w-5m7g-f7qc/GHSA-w73w-5m7g-f7qc.json
CWE IDs: ["CWE-287", "CWE-755"]
Alternative ID: GHSA-w73w-5m7g-f7qc
Finding: F039
Auto approve: 1