CVE-2024-31033 – io.jsonwebtoken:jjwt-impl
Package
Manager: maven
Name: io.jsonwebtoken:jjwt-impl
Vulnerable Version: <0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00131 pctl0.33356
Details
Withdrawn: JJWT improperly generates signing keys ## Withdrawn Advisory This advisory has been withdrawn because it has been found to be disputed. Please see the issue [here](https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358) for more information. ## Original Description JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class.
Metadata
Created: 2024-04-01T03:30:38Z
Modified: 2024-04-03T14:52:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r65j-6h5f-4f92/GHSA-r65j-6h5f-4f92.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-r65j-6h5f-4f92
Finding: F052
Auto approve: 1