In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade jwt to version 3.2.0 or higher.
Affected versions of this package are vulnerable to Improper Authentication in the signing and verification logic before applying JWT.decode. An attacker can forge valid JWTs by supplying a crafted token that passes signature verification due to the acceptance of empty keys.
Note: This is only exploitable if the application passes an empty string as the key, or if the keyfinder returns an empty string, nil, or an array containing nil for unknown keys, and the enforce_hmac_key_length option is not enabled.