Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/distribution/distribution/v3/registry/auth/token
to version 3.0.0-rc.3 or higher.
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to improper verification of JSON Web Key (JWK) material in the token authentication process. An attacker can exploit this vulnerability by injecting an untrusted signing key into a JSON Web Token (JWT) when the JWT contains a JWK header without a certificate chain.