Signature Verification Bypass in jwt-simple
High severity
GitHub Reviewed
Published
Jun 6, 2019
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Jun 6, 2019
Published to the GitHub Advisory Database
Jun 6, 2019
Last updated
Jan 9, 2023
Versions of
jwt-simple
prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in thedecode()
function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).Recommendation
Upgrade to version 0.5.3 or later.
References