Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-11424
HistoryAug 24, 2017 - 12:00 a.m.

CVE-2017-11424

2017-08-2400:00:00
ubuntu.com
ubuntu.com
20

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

35.1%

In PyJWT 1.5.0 and below the invalid_strings check in
HMACAlgorithm.prepare_key does not account for all PEM encoded public
keys. Specifically, the PKCS1 PEM encoded format would be allowed because
it is prefaced with the string -----BEGIN RSA PUBLIC KEY----- which is
not accounted for. This enables symmetric/asymmetric key confusion attacks
against users using the PKCS1 PEM encoded public keys, which would allow an
attacker to craft JWTs from scratch.

Notes

Author Note
tyhicks The added deprecation warnings present in the fix probably aren’t needed in security backports
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchpyjwt< 1.3.0-1ubuntu0.1UNKNOWN
ubuntu17.04noarchpyjwt< 1.4.2-1ubuntu0.1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

35.1%