Signature Verification Bypass Affecting jwt-simple package, versions <0.5.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-JWTSIMPLE-174523
  • published25 Apr 2019
  • disclosed24 Apr 2019
  • creditDaniel Gunawan

Introduced: 24 Apr 2019

CVE NOT AVAILABLE CWE-358  (opens in a new tab)

How to fix?

Upgrade jwt-simple to version 0.5.3 or higher.

Overview

jwt-simple is a JWT(JSON Web Token) encode and decode module.

Affected versions of this package are vulnerable to Signature Verification Bypass. If no algorithm is specified in the decode() function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).

CVSS Scores

version 3.1