Signature Validation Bypass Affecting com.inversoft:prime-jwt Open this link in a new tab package, versions [,1.3.0)
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-COMINVERSOFT-32119
-
published
15 Mar 2018
-
disclosed
30 Jan 2017
-
credit
dmak
Introduced: 30 Jan 2017
CVE-2018-1000125 Open this link in a new tabHow to fix?
Upgrade com.inversoft:prime-jwt
to version 1.3.0 or higher.
Overview
com.inversoft:prime-jwt is a simple to use Java 8 JWT Library.
Affected versions of this package are vulnerable to Signature Validation Bypass. It contains an input validation vulnerability in JWTDecoder.decode
that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appears to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated.