Lucene search

K
cveGitHub_MCVE-2023-23928
HistoryFeb 01, 2023 - 1:15 a.m.

CVE-2023-23928

2023-02-0101:15:09
CWE-347
GitHub_M
web.nvd.nist.gov
82
reason-jose
jose implementation
authorization bypass
privilege escalation
security vulnerability
nvd
cve-2023-23928

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

59.2%

reason-jose is a JOSE implementation in ReasonML and OCaml.Jose.Jws.validate does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.

Affected configurations

Nvd
Vulners
Node
reason-jose_projectreason-joseRange<0.8.2
VendorProductVersionCPE
reason-jose_projectreason-jose*cpe:2.3:a:reason-jose_project:reason-jose:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ulrikstrid",
    "product": "reason-jose",
    "versions": [
      {
        "version": "< 0.8.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.002

Percentile

59.2%

Related for CVE-2023-23928