4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.1 Medium
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.3%
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with Lcobucci\JWT\Signer\Key\LocalFileReference
as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Versions 3.4.6, 4.0.4, and 4.1.5 have been patched to always load the file contents, deprecated the Lcobucci\JWT\Signer\Key\LocalFileReference
, and suggest Lcobucci\JWT\Signer\Key\InMemory
as the alternative. As a workaround, use Lcobucci\JWT\Signer\Key\InMemory
instead of Lcobucci\JWT\Signer\Key\LocalFileReference
to create the instances of one’s keys.
[
{
"product": "jwt",
"vendor": "lcobucci",
"versions": [
{
"status": "affected",
"version": ">= 3.4.0, < 3.4.6"
},
{
"status": "affected",
"version": ">= 4.0.0, < 4.0.4"
},
{
"status": "affected",
"version": ">= 4.1.0, < 4.1.5"
}
]
}
]
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.1 Medium
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.3%