CVE-2016-10555 – jwt-simple
Package
Manager: npm
Name: jwt-simple
Vulnerable Version: >=0 <0.3.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.74595 pctl0.98813
Details
Forgeable Public/Private Tokens in jwt-simple Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 0.3.1 or later. Additionally, be sure to always specify an algorithm in calls to `.decode()`.
Metadata
Created: 2018-11-06T23:12:07Z
Modified: 2020-08-31T18:10:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/11/GHSA-vgrx-w6rg-8fqf/GHSA-vgrx-w6rg-8fqf.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-vgrx-w6rg-8fqf
Finding: F184
Auto approve: 1