Improper Verification of Cryptographic Signature Affecting jupyterhub-ltiauthenticator package, versions [1.3.0,1.4.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-JUPYTERHUBLTIAUTHENTICATOR-8749454
  • published26 Feb 2025
  • disclosed25 Feb 2025
  • creditUnknown

Introduced: 25 Feb 2025

NewCVE-2023-25574  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade jupyterhub-ltiauthenticator to version 1.4.0 or higher.

Overview

jupyterhub-ltiauthenticator is a JupyterHub authenticator implementing LTI v1.1 and LTI v1.3

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the jwt_verify_and_decode() function, in the form of improper validation of JWT signatures. An attacker can authorize a forged request if the target application is configured to use LTI13Authenticator.

CVSS Scores

version 4.0
version 3.1