Lucene search

K
nodejsTheofanis KatsimpasNODEJS:87
HistoryMar 21, 2016 - 5:05 p.m.

Forgeable Public/Private Tokens

2016-03-2117:05:15
Theofanis Katsimpas
www.npmjs.com
20

0.001 Low

EPSS

Percentile

42.2%

Overview

Affected versions of the jwt-simple package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.

Recommendation

Update to version 0.3.1 or later.

Additionally, be sure to always specify an algorithm in calls to .decode().

References

CPENameOperatorVersion
jwt-simplele0.3.0

0.001 Low

EPSS

Percentile

42.2%