Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXZncngtdzZyZy04ZnFm

Forgeable Public/Private Tokens in jwt-simple

Affected versions of the jwt-simple package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.

Recommendation

Update to version 0.3.1 or later.

Additionally, be sure to always specify an algorithm in calls to .decode().

Permalink: https://github.com/advisories/GHSA-vgrx-w6rg-8fqf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXZncngtdzZyZy04ZnFm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 6 years ago
Updated: almost 2 years ago


Identifiers: GHSA-vgrx-w6rg-8fqf, CVE-2016-10555
References: Repository: https://github.com/hokaccha/node-jwt-simple
Blast Radius: 0.0

Affected Packages

npm:jwt-simple
Dependent packages: 618
Dependent repositories: 18,123
Downloads: 849,941 last month
Affected Version Ranges: < 0.3.1
Fixed in: 0.3.1
All affected versions: 0.1.0, 0.2.0, 0.3.0
All unaffected versions: 0.3.1, 0.4.0, 0.4.1, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.5.6