Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.
Start learningUpgrade beatt83/jose-swift to version 6.0.2 or higher.
beatt83/jose-swift is a comprehensive support for the Jose suite of standards, including JWA (JSON Web Algorithms), JWK (JSON Web Key), JWE (JSON Web Encryption), JWS (JSON Web Signature), and JWT (JSON Web Token).
Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm via the verify function. An attacker can impersonate any user, escalate privileges, and gain unauthorized access by crafting a JWT token with the header parameter alg set to none, which causes the verification process to return true without performing any cryptographic checks.