Lucene search

K
cve[email protected]CVE-2023-48238
HistoryNov 17, 2023 - 10:15 p.m.

CVE-2023-48238

2023-11-1722:15:07
CWE-345
web.nvd.nist.gov
41
cve
javascript
json web tokens
jwt
security
algorithm
vulnerability
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

18.0%

joaquimserafim/json-web-token is a javascript library use to interact with JSON Web Tokens (JWT) which are a compact URL-safe means of representing claims to be transferred between two parties. Affected versions of the json-web-token library are vulnerable to a JWT algorithm confusion attack. On line 86 of the ‘index.js’ file, the algorithm to use for verifying the signature of the JWT token is taken from the JWT token, which at that point is still unverified and thus shouldn’t be trusted. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work against this library is the RS256 algorithm is in use, however it is a best practice to use that algorithm.

Affected configurations

Vulners
NVD
Node
joaquimserafimjson_web_tokenRange<3.1.1
VendorProductVersionCPE
joaquimserafimjson_web_token*cpe:2.3:a:joaquimserafim:json_web_token:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "joaquimserafim",
    "product": "json-web-token",
    "versions": [
      {
        "version": "< 3.1.1",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0005 Low

EPSS

Percentile

18.0%

Related for CVE-2023-48238