Improper Verification of Cryptographic Signature The advisory has been revoked - it doesn't affect any version of package libcrypt-jwt-perl  (opens in a new tab)


Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-LIBCRYPTJWTPERL-602572
  • published19 Aug 2020
  • disclosed17 Jul 2019

Introduced: 17 Jul 2019

CVE-2019-1010263  (opens in a new tab)
CWE-347  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcrypt-jwt-perl package and not the libcrypt-jwt-perl package as distributed by Debian.

Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.