Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU4cjQtaDZ2OC1qY3Zt

Regression in JWT Signature Validation

Overview

Versions after and including 2.3.0 are improperly validating the JWT token signature when using the JWTValidator.verify method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.

Am I affected?

You are affected by this vulnerability if all of the following conditions apply:

How to fix that?

Upgrade to version 2.4.1.

Will this update impact my users?

The fix provided in this version will not affect your users.

Permalink: https://github.com/advisories/GHSA-58r4-h6v8-jcvm
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU4cjQtaDZ2OC1qY3Zt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: about 1 year ago


CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-58r4-h6v8-jcvm, CVE-2020-15240
References: Repository: https://github.com/auth0/omniauth-auth0
Blast Radius: 22.7

Affected Packages

rubygems:omniauth-auth0
Dependent packages: 4
Dependent repositories: 1,151
Downloads: 27,773,546 total
Affected Version Ranges: >= 2.3.0, < 2.4.1
Fixed in: 2.4.1
All affected versions: 2.3.0, 2.3.1, 2.4.0
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.3.0, 1.4.0, 1.4.1, 1.4.2, 2.0.0, 2.1.0, 2.2.0, 2.4.1, 2.4.2, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.1.1