Authentication Bypass Affecting drf-jwt package, versions [1.15.0,1.15.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.37% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DRFJWT-560361
  • published15 Mar 2020
  • disclosed15 Mar 2020
  • creditUnknown

Introduced: 15 Mar 2020

CVE-2020-10594  (opens in a new tab)
CWE-289  (opens in a new tab)

How to fix?

Upgrade drf-jwt to version 1.15.1 or higher.

Overview

drf-jwt is a JSON Web Token Authentication support package for Django REST Framework. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained.

Affected versions of this package are vulnerable to Authentication Bypass. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature.

CVSS Base Scores

version 3.1