Signature Validation Bypass Affecting com.inversoft:prime-jwt package, versions [,1.3.0)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.19% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-COMINVERSOFT-32119
- published 15 Mar 2018
- disclosed 30 Jan 2017
- credit dmak
Introduced: 30 Jan 2017
CVE-2018-1000125 Open this link in a new tabHow to fix?
Upgrade com.inversoft:prime-jwt
to version 1.3.0 or higher.
Overview
com.inversoft:prime-jwt is a simple to use Java 8 JWT Library.
Affected versions of this package are vulnerable to Signature Validation Bypass. It contains an input validation vulnerability in JWTDecoder.decode
that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appears to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated.