nimbus-jose-jwt is vulnerable to authentication bypass. The bypass exists because the library ignores the checking of integer-overflow when converting length values from bytes to bits. A malicious user can shift Additional Authenticated Data (AAD) and ciphertext, resulting in a different plaintext for the same HMAC, bypassing the HMAC authentication.
CPE | Name | Operator | Version |
---|---|---|---|
nimbus jose+jwt | eq | 4.16 | |
nimbus jose+jwt | le | 4.14 | |
nimbus jose+jwt | le | 4.38 |
bitbucket.org/connect2id/nimbus-jose-jwt/commits/0d2bd649ea386539220d4facfe1f65eb1dadb86c
bitbucket.org/connect2id/nimbus-jose-jwt/issues/224/
bitbucket.org/connect2id/nimbus-jose-jwt/issues/224/byte-to-bit-overflow-in-cbc
bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt
bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt?fileviewer=file-view-default
lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E