-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0 #354
Comments
My initial take is that VP is not vulnerable... "This is a security problem if the JWT token is presented to a service that lacks its own audience check."
I'll investigate further and confirm. |
This fork has a fix |
* move claims.Sites into claims.Audience * move check Site to check Audience * general cleanup * rename CreateUserTokenString to NewVPJWT
The VP side |
merged in |
CVE-2020-26160 - High Severity Vulnerability
Vulnerable Library - github.com/dgrijalva/jwt-go-v3.2.0
Golang implementation of JSON Web Tokens (JWT)
Dependency Hierarchy:
Found in HEAD commit: 86266a070a0504e2b0c6f3b89c04e1f472431af6
Found in base branch: master
Vulnerability Details
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Publish Date: 2020-09-30
URL: CVE-2020-26160
CVSS 3 Score Details (7.5)
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: