Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qZnhtLXc4ZzItNHJjds36jg
Cisco node-jose improper validation of JWT signature
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Permalink: https://github.com/advisories/GHSA-jfxm-w8g2-4rcvJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qZnhtLXc4ZzItNHJjds36jg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 7 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-jfxm-w8g2-4rcv, CVE-2018-0114
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-0114
- https://github.com/cisco/node-jose/blob/master/CHANGELOG.md
- https://github.com/zi0Black/POC-CVE-2018-0114
- https://tools.cisco.com/security/center/viewAlert.x?alertId=56326
- https://www.exploit-db.com/exploits/44324/
- https://web.archive.org/web/20210124130907/http://www.securityfocus.com/bid/102445
- https://github.com/advisories/GHSA-jfxm-w8g2-4rcv
Blast Radius: 25.7
Affected Packages
npm:node-jose
Dependent packages: 319Dependent repositories: 2,692
Downloads: 1,703,803 last month
Affected Version Ranges: < 0.11.0
Fixed in: 0.11.0
All affected versions: 0.3.0, 0.3.1, 0.4.0, 0.5.0, 0.5.1, 0.5.2, 0.6.0, 0.7.0, 0.7.1, 0.8.0, 0.8.1, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.10.0
All unaffected versions: 0.11.0, 0.11.1, 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 2.0.0, 2.1.0, 2.1.1, 2.2.0