logo

CVE-2016-1000223 jws

Package

Manager: npm
Name: jws
Vulnerable Version: >=0 <3.0.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

EPSS: N/A pctlN/A

Details

Forgeable Public/Private Tokens in jws Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 3.0.0 or later.

Metadata

Created: 2020-09-01T15:23:18Z
Modified: 2021-09-23T21:25:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-gjcw-v447-2w7q/GHSA-gjcw-v447-2w7q.json
CWE IDs: []
Alternative ID: GHSA-gjcw-v447-2w7q
Finding: F184
Auto approve: 1