logo

CVE-2020-26160 github.com/dgrijalva/jwt-go/v4

Package

Manager: go
Name: github.com/dgrijalva/jwt-go/v4
Vulnerable Version: >=0 <4.0.0-preview1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00066 pctl0.2078

Details

Authorization bypass in github.com/dgrijalva/jwt-go jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1

Metadata

Created: 2021-05-18T21:08:21Z
Modified: 2024-05-20T19:26:26Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-w73w-5m7g-f7qc/GHSA-w73w-5m7g-f7qc.json
CWE IDs: ["CWE-287", "CWE-755"]
Alternative ID: GHSA-w73w-5m7g-f7qc
Finding: F039
Auto approve: 1