File size: 62,363 Bytes
c8d30bc | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 | {
"package": "jwt",
"source": "NVD",
"count": 100,
"vulnerabilities": [
{
"cve_id": "CVE-2022-39366",
"cvss_score": 9.9,
"severity": "CRITICAL",
"description": "DataHub is an open-source metadata platform. Prior to version 0.8.45, the `StatelessTokenService` of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because the `StatelessTokenService` of the Metadata service uses the `parse` method of `io.jsonwebtoken.JwtParser`, which does not perform a verification of the cryptographic tok",
"published": "2022-10-28T17:15:23.590",
"affected_versions": "< 0.8.45",
"cpe_vendors": [
"datahub:datahub"
]
},
{
"cve_id": "CVE-2016-8218",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "An issue was discovered in Cloud Foundry Foundation routing-release versions prior to 0.142.0 and cf-release versions 203 to 231. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users to the routing API, aka an \"Unauthenticated JWT signing algorithm in routing\" issue.",
"published": "2017-06-13T06:29:00.237",
"affected_versions": "<= 203, 204, 205",
"cpe_vendors": [
"cloudfoundry:cf-release",
"cloudfoundry:routing-release"
]
},
{
"cve_id": "CVE-2017-2773",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users in multiple components included in PCF Elastic Runtime, aka an \"Unauthenticated JWT signing algorithm in multiple components\" issue.",
"published": "2017-06-13T06:29:00.300",
"affected_versions": "1.6.0, 1.6.1, 1.6.2",
"cpe_vendors": [
"pivotal_software:cloud_foundry_elastic_runtime"
]
},
{
"cve_id": "CVE-2018-1000125",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appear to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated. This vulnerability appears to have been fixed in 1.3.0 and later or after commit ",
"published": "2018-03-13T21:29:00.367",
"affected_versions": "< 1.3.0",
"cpe_vendors": [
"inversoft:prime-jwt"
]
},
{
"cve_id": "CVE-2017-18239",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.",
"published": "2018-03-18T03:29:00.213",
"affected_versions": "<= 0.4.5",
"cpe_vendors": [
"authentikat-jwt_project:authentikat-jwt"
]
},
{
"cve_id": "CVE-2018-6873",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "The Auth0 authentication service before 2017-10-15 allows privilege escalation because the JWT audience is not validated.",
"published": "2018-04-04T17:29:01.647",
"affected_versions": "<= 8.10.1",
"cpe_vendors": [
"auth0:auth0.js"
]
},
{
"cve_id": "CVE-2019-7644",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.",
"published": "2019-04-11T20:29:00.760",
"affected_versions": "< 1.0.4",
"cpe_vendors": [
"auth0:auth0-wcf-service-jwt"
]
},
{
"cve_id": "CVE-2019-1010263",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.",
"published": "2019-07-17T21:15:10.780",
"affected_versions": "< 0.023",
"cpe_vendors": [
"perl_crypt\\:\\"
]
},
{
"cve_id": "CVE-2019-1010161",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.",
"published": "2019-07-25T14:15:11.453",
"affected_versions": "<= 0.022",
"cpe_vendors": [
"perl-crypt-jwt_project:perl-crypt-jwt"
]
},
{
"cve_id": "CVE-2019-17195",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.",
"published": "2019-10-15T14:15:12.380",
"affected_versions": "< 7.9, 3.2.1, 1.7.0",
"cpe_vendors": [
"connect2id:nimbus_jose\\+jwt",
"apache:hadoop",
"oracle:communications_cloud_native_core_security_edge_protection_proxy",
"oracle:communications_pricing_design_center",
"oracle:data_integrator",
"oracle:enterprise_manager_base_platform",
"oracle:healthcare_data_repository",
"oracle:insurance_policy_administration",
"oracle:jd_edwards_enterpriseone_orchestrator",
"oracle:jd_edwards_enterpriseone_tools"
]
},
{
"cve_id": "CVE-2019-12511",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "In NETGEAR Nighthawk X10-R9000 prior to 1.0.4.26, an attacker may execute arbitrary system commands as root by sending a specially-crafted MAC address to the \"NETGEAR Genie\" SOAP endpoint at AdvancedQoS:GetCurrentBandwidthByMAC. Although this requires QoS being enabled, advanced QoS being enabled, and a valid authentication JWT, additional vulnerabilities (CVE-2019-12510) allow an attacker to interact with the entire SOAP API without authentication. Additionally, DNS rebinding techniques may be ",
"published": "2020-02-24T19:15:13.513",
"affected_versions": "< 1.0.4.26",
"cpe_vendors": [
"netgear:nighthawk_x10-r9000_firmware"
]
},
{
"cve_id": "CVE-2020-26892",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled.",
"published": "2020-11-06T08:15:13.610",
"affected_versions": "< 2.1.9, 33",
"cpe_vendors": [
"linuxfoundation:nats-server",
"fedoraproject:fedora"
]
},
{
"cve_id": "CVE-2019-20933",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).",
"published": "2020-11-19T02:15:11.913",
"affected_versions": "< 1.7.6, 9.0, 10.0",
"cpe_vendors": [
"influxdata:influxdb",
"debian:debian_linux"
]
},
{
"cve_id": "CVE-2021-3199",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.",
"published": "2021-01-26T18:16:28.507",
"affected_versions": "< 5.6.3",
"cpe_vendors": [
"onlyoffice:document_server"
]
},
{
"cve_id": "CVE-2021-40494",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.",
"published": "2021-09-03T02:15:06.467",
"affected_versions": "<= 2.1.3",
"cpe_vendors": [
"adaptivescale:lxdui"
]
},
{
"cve_id": "CVE-2021-37580",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0",
"published": "2021-11-16T10:15:07.220",
"affected_versions": "2.3.0, 2.4.0",
"cpe_vendors": [
"apache:shenyu"
]
},
{
"cve_id": "CVE-2021-45389",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "A flaw was found with the JWT token. A self-signed JWT token could be injected into the update manager and bypass the authentication process, thus could escalate privileges. This affects StarWind SAN and NAS build 1578 and StarWind Command Center build 6864.",
"published": "2022-01-04T16:15:09.727",
"affected_versions": "6864, 1578",
"cpe_vendors": [
"starwind:command_center",
"starwind:san\\&nas"
]
},
{
"cve_id": "CVE-2022-22845",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.",
"published": "2022-01-10T14:12:58.567",
"affected_versions": "< 1.4.28",
"cpe_vendors": [
"qxip:homer_webapp"
]
},
{
"cve_id": "CVE-2022-35540",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.",
"published": "2022-08-18T23:15:08.293",
"affected_versions": "< 1.6.8",
"cpe_vendors": [
"dotnetcore:agileconfig"
]
},
{
"cve_id": "CVE-2022-36672",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the project config file. This vulnerability allows attackers to create a custom user session.",
"published": "2022-09-01T03:15:16.343",
"affected_versions": "3.6.2",
"cpe_vendors": [
"xxyopen:novel-plus"
]
},
{
"cve_id": "CVE-2022-42980",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "go-admin (aka GO Admin) 2.0.12 uses the string go-admin as a production JWT key.",
"published": "2022-10-17T07:15:08.863",
"affected_versions": "2.0.12",
"cpe_vendors": [
"go-admin:go-admin"
]
},
{
"cve_id": "CVE-2022-44796",
"cvss_score": 9.8,
"severity": "CRITICAL",
"description": "An issue was discovered in Object First Ootbi BETA build 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in Object First Ootbi BETA build 1.0.13.1611.",
"published": "2022-11-07T04:15:09.600",
"affected_versions": "< 1.0.13.1611",
"cpe_vendors": [
"objectfirst:ootbi"
]
},
{
"cve_id": "CVE-2021-29451",
"cvss_score": 9.1,
"severity": "CRITICAL",
"description": "Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.",
"published": "2021-04-16T22:15:14.233",
"affected_versions": "< 5.2.1",
"cpe_vendors": [
"manydesigns:portofino"
]
},
{
"cve_id": "CVE-2022-39227",
"cvss_score": 9.1,
"severity": "CRITICAL",
"description": "python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to versio",
"published": "2022-09-23T07:15:09.300",
"affected_versions": "< 3.3.4",
"cpe_vendors": [
"python-jwt_project:python-jwt"
]
},
{
"cve_id": "CVE-2019-13423",
"cvss_score": 8.8,
"severity": "HIGH",
"description": "Search Guard Kibana Plugin versions before 5.6.8-7 and before 6.x.y-12 had an issue that an authenticated Kibana user could impersonate as kibanaserver user when providing wrong credentials when all of the following conditions a-c are true: a) Kibana is configured to use Single-Sign-On as authentication method, one of Kerberos, JWT, Proxy, Client certificate. b) The kibanaserver user is configured to use HTTP Basic as the authentication method. c) Search Guard is configured to use an SSO authent",
"published": "2019-08-23T14:15:11.607",
"affected_versions": "< 5.6.8-7, < 6.2.3-12",
"cpe_vendors": [
"search-guard:search_guard"
]
},
{
"cve_id": "CVE-2021-26077",
"cvss_score": 8.8,
"severity": "HIGH",
"description": "Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle en",
"published": "2021-05-10T00:15:07.543",
"affected_versions": "< 2.1.3, < 2.1.5",
"cpe_vendors": [
"atlassian:connect_spring_boot"
]
},
{
"cve_id": "CVE-2021-24804",
"cvss_score": 8.8,
"severity": "HIGH",
"description": "The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.",
"published": "2021-11-17T11:15:07.990",
"affected_versions": "< 3.2.1",
"cpe_vendors": [
"simple_jwt_login_project:simple_jwt_login"
]
},
{
"cve_id": "CVE-2022-42983",
"cvss_score": 8.8,
"severity": "HIGH",
"description": "anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens.",
"published": "2022-10-17T07:15:08.973",
"affected_versions": "0.9.8.6",
"cpe_vendors": [
"anji-plus:aj-report"
]
},
{
"cve_id": "CVE-2020-1764",
"cvss_score": 8.6,
"severity": "HIGH",
"description": "A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.",
"published": "2020-03-26T13:15:13.203",
"affected_versions": "< 1.15.1, 1.0",
"cpe_vendors": [
"kiali:kiali",
"redhat:openshift_service_mesh"
]
},
{
"cve_id": "CVE-2021-22190",
"cvss_score": 8.5,
"severity": "HIGH",
"description": "A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token",
"published": "2021-04-12T15:15:14.517",
"affected_versions": "< 13.7.8, < 13.7.8, < 13.8.5",
"cpe_vendors": [
"gitlab:gitlab"
]
},
{
"cve_id": "CVE-2021-32753",
"cvss_score": 8.3,
"severity": "HIGH",
"description": "EdgeX Foundry is an open source project for building a common open framework for internet-of-things edge computing. A vulnerability exists in the Edinburgh, Fuji, Geneva, and Hanoi versions of the software. When the EdgeX API gateway is configured for OAuth2 authentication and a proxy user is created, the client_id and client_secret required to obtain an OAuth2 authentication token are set to the username of the proxy user. A remote network attacker can then perform a dictionary-based password a",
"published": "2021-07-09T19:15:08.373",
"affected_versions": "< 2.0.0",
"cpe_vendors": [
"edgexfoundry:edgex_foundry"
]
},
{
"cve_id": "CVE-2020-7787",
"cvss_score": 8.2,
"severity": "HIGH",
"description": "This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated",
"published": "2020-12-09T17:15:32.027",
"affected_versions": "",
"cpe_vendors": [
"react-adal_project:react-adal"
]
},
{
"cve_id": "CVE-2021-21378",
"cvss_score": 8.2,
"severity": "HIGH",
"description": "Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the `allow_missing` requirement under `requires_any` due to a mistake in implementation. Envoy's JWT Authentication filter can be configured with the `allow_missing` requirement that will be satisfied if JWT is missing (JwtMissed error) a",
"published": "2021-03-11T03:15:12.163",
"affected_versions": "1.17.0",
"cpe_vendors": [
"envoyproxy:envoy"
]
},
{
"cve_id": "CVE-2022-36089",
"cvss_score": 8.2,
"severity": "HIGH",
"description": "KubeVela is an application delivery platform Users using KubeVela's VelaUX APIServer could be affected by an authentication bypass vulnerability. In KubeVela prior to versions 1.4.11 and 1.5.4, VelaUX APIServer uses the `PlatformID` as the signed key to generate the JWT tokens for users. Another API called `getSystemInfo` exposes the platformID. This vulnerability allows users to use the platformID to re-generate the JWT tokens to bypass the authentication. Versions 1.4.11 and 1.5.4 contain a pa",
"published": "2022-09-07T23:15:14.240",
"affected_versions": "< 1.4.11, < 1.5.3",
"cpe_vendors": [
"kubevela:kubevela"
]
},
{
"cve_id": "CVE-2018-1000025",
"cvss_score": 8.1,
"severity": "HIGH",
"description": "Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in src/Firebase/Auth/IdTokenVerifier.php does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1.",
"published": "2018-02-09T23:29:00.777",
"affected_versions": "<= 3.8.0",
"cpe_vendors": [
"firebase_admin_sdk_for_php_project:firebase_admin_sdk_for_php"
]
},
{
"cve_id": "CVE-2021-29492",
"cvss_score": 8.1,
"severity": "HIGH",
"description": "Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences `%2F` and `%5C` in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. `/something%2F..%2Fadmin`, to bypass access control, e.g. a block on `/admin`. A backend server could then decode slash sequences and normalize path and provide an attacker access beyond the scope provided for by the access control policy. ### Impact Escalation of Privileges ",
"published": "2021-05-28T21:15:08.670",
"affected_versions": "< 1.15.5, < 1.16.4, < 1.17.3",
"cpe_vendors": [
"envoyproxy:envoy"
]
},
{
"cve_id": "CVE-2022-24844",
"cvss_score": 8.1,
"severity": "HIGH",
"description": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.",
"published": "2022-04-13T21:15:07.887",
"affected_versions": "< 2.5.1",
"cpe_vendors": [
"gin-vue-admin_project:gin-vue-admin"
]
},
{
"cve_id": "CVE-2022-29060",
"cvss_score": 8.1,
"severity": "HIGH",
"description": "A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiDDoS API 5.5.0 through 5.5.1, 5.4.0 through 5.4.2, 5.3.0 through 5.3.1, 5.2.0, 5.1.0 may allow an attacker who managed to retrieve the key from one device to sign JWT tokens for any device.",
"published": "2022-07-19T14:15:08.603",
"affected_versions": "5.1.0, 5.2.0, 5.3.0",
"cpe_vendors": [
"fortinet:fortiddos"
]
},
{
"cve_id": "CVE-2021-26073",
"cvss_score": 7.7,
"severity": "HIGH",
"description": "Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accep",
"published": "2021-04-16T03:15:12.033",
"affected_versions": "< 6.6.0",
"cpe_vendors": [
"atlassian:connect_express"
]
},
{
"cve_id": "CVE-2022-25898",
"cvss_score": 7.7,
"severity": "HIGH",
"description": "The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.",
"published": "2022-07-01T20:15:08.023",
"affected_versions": "< 10.5.25",
"cpe_vendors": [
"jsrsasign_project:jsrsasign"
]
},
{
"cve_id": "CVE-2016-7037",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.",
"published": "2017-01-23T21:59:02.487",
"affected_versions": "<= 1.0.2",
"cpe_vendors": [
"emarref:jwt"
]
},
{
"cve_id": "CVE-2017-11424",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.",
"published": "2017-08-24T16:29:00.197",
"affected_versions": "<= 1.5.0, 8.0, 9.0",
"cpe_vendors": [
"pyjwt_project:pyjwt",
"debian:debian_linux"
]
},
{
"cve_id": "CVE-2018-1000531",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.",
"published": "2018-06-26T16:29:01.807",
"affected_versions": "<= 1.3.0",
"cpe_vendors": [
"inversoft:prime-jwt"
]
},
{
"cve_id": "CVE-2019-12995",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Istio before 1.2.2 mishandles certain access tokens, leading to \"Epoch 0 terminated with an error\" in Envoy. This is related to a jwt_authenticator.cc segmentation fault.",
"published": "2019-06-28T10:15:11.487",
"affected_versions": "< 1.2.2",
"cpe_vendors": [
"istio:istio"
]
},
{
"cve_id": "CVE-2019-1020015",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "graphql-engine (aka Hasura GraphQL Engine) before 1.0.0-beta.3 mishandles the audience check while verifying JWT.",
"published": "2019-07-29T13:15:12.090",
"affected_versions": "< 1.0.0, 1.0.0, 1.0.0",
"cpe_vendors": [
"hasura:graphql_engine"
]
},
{
"cve_id": "CVE-2019-14993",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Istio before 1.1.13 and 1.2.x before 1.2.4 mishandles regular expressions for long URIs, leading to a denial of service during use of the JWT, VirtualService, HTTPAPISpecBinding, or QuotaSpecBinding API.",
"published": "2019-08-13T18:15:13.117",
"affected_versions": "< 1.1.13, < 1.2.4",
"cpe_vendors": [
"istio:istio"
]
},
{
"cve_id": "CVE-2019-19324",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Xmidt cjwt through 1.0.1 before 2019-11-25 maps unsupported algorithms to alg=none, which sometimes leads to untrusted accidental JWT acceptance.",
"published": "2020-03-20T18:15:13.857",
"affected_versions": "< 2019-11-25",
"cpe_vendors": [
"xmidt:cjwt"
]
},
{
"cve_id": "CVE-2020-15957",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "An issue was discovered in DP3T-Backend-SDK before 1.1.1 for Decentralised Privacy-Preserving Proximity Tracing (DP3T). When it is configured to check JWT before uploading/publishing keys, it is possible to skip the signature check by providing a JWT token with alg=none.",
"published": "2020-07-30T14:15:12.260",
"affected_versions": "< 1.1.1",
"cpe_vendors": [
"dp3t-backend-software_development_kit_project:dp3t-backend-software_development_kit"
]
},
{
"cve_id": "CVE-2020-26160",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m[\"aud\"] (which is allowed by the specification). Because the type assertion fails, \"\" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.",
"published": "2020-09-30T18:15:27.397",
"affected_versions": "<= 3.2.0",
"cpe_vendors": [
"jwt-go_project:jwt-go"
]
},
{
"cve_id": "CVE-2020-26511",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "The wpo365-login plugin before v11.7 for WordPress allows use of a symmetric algorithm to decrypt a JWT token. This leads to authentication bypass.",
"published": "2020-10-02T05:15:12.457",
"affected_versions": "< 11.7",
"cpe_vendors": [
"wpo365:wordpress_\\+_azure_ad_\\/_microsoft_office_365"
]
},
{
"cve_id": "CVE-2020-26521",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code).",
"published": "2020-11-06T08:15:13.563",
"affected_versions": "< 2.1.9, 33",
"cpe_vendors": [
"linuxfoundation:nats-server",
"fedoraproject:fedora"
]
},
{
"cve_id": "CVE-2021-3127",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.",
"published": "2021-03-16T20:15:13.300",
"affected_versions": "< 2.2.0, < 2.0.1",
"cpe_vendors": [
"linuxfoundation:nats-server",
"nats:jwt_library"
]
},
{
"cve_id": "CVE-2021-27306",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "An improper access control vulnerability in the JWT plugin in Kong Gateway prior to 2.3.2.0 allows unauthenticated users access to authenticated routes without a valid token JWT.",
"published": "2021-03-18T15:15:16.230",
"affected_versions": "< 2.3.2.0",
"cpe_vendors": [
"konghq:kong_gateway"
]
},
{
"cve_id": "CVE-2021-22696",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a \"request\" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the \"request_uri\" parameter. CXF was not validating the \"request_uri\" parameter (apart from ensuring it uses \"https) and was making a REST request to the para",
"published": "2021-04-02T10:15:12.200",
"affected_versions": "< 3.3.10, < 3.4.3, 5.5.0.0.0",
"cpe_vendors": [
"apache:cxf",
"oracle:business_intelligence",
"oracle:communications_diameter_intelligence_hub",
"oracle:communications_element_manager",
"oracle:communications_session_report_manager",
"oracle:communications_session_route_manager"
]
},
{
"cve_id": "CVE-2021-29455",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Grassroot Platform is an application to make it faster, cheaper and easier to persistently organize and mobilize people in low-income communities. Grassroot Platform before master deployment as of 2021-04-16 did not properly verify the signature of JSON Web Tokens when refreshing an existing JWT. This allows to forge a valid JWT. The problem has been patched in version 1.3.1 by deprecating the JWT refresh function, which was an overdue deprecation regardless (the \"refresh\" flow is no longer used",
"published": "2021-04-19T19:15:17.827",
"affected_versions": "< 1.3.1",
"cpe_vendors": [
"grassroot:grassroot_platform"
]
},
{
"cve_id": "CVE-2021-29500",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "bubble fireworks is an open source java package relating to Spring Framework. In bubble fireworks before version 2021.BUILD-SNAPSHOT there is a vulnerability in which the package did not properly verify the signature of JSON Web Tokens. This allows to forgery of valid JWTs.",
"published": "2021-06-04T20:15:07.763",
"affected_versions": "< 2021.build-snapshot",
"cpe_vendors": [
"bubble_fireworks_project:bubble_fireworks"
]
},
{
"cve_id": "CVE-2021-29157",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.",
"published": "2021-06-28T12:15:08.647",
"affected_versions": "< 2.3.14.1, 33, 34",
"cpe_vendors": [
"dovecot:dovecot",
"fedoraproject:fedora"
]
},
{
"cve_id": "CVE-2021-35342",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "The useradm service 1.14.0 (in Northern.tech Mender Enterprise 2.7.x before 2.7.1) and 1.13.0 (in Northern.tech Mender Enterprise 2.6.x before 2.6.1) allows users to access the system with their JWT token after logout, because of missing invalidation (if the JWT verification cache is enabled).",
"published": "2021-08-27T10:15:07.793",
"affected_versions": "1.14.0, 1.13.0",
"cpe_vendors": [
"northern.tech:useradm"
]
},
{
"cve_id": "CVE-2021-44877",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that ",
"published": "2021-12-21T17:15:08.590",
"affected_versions": "2.22.8",
"cpe_vendors": [
"dalmark:systeam_enterprise_resource_planning"
]
},
{
"cve_id": "CVE-2021-24998",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "The Simple JWT Login WordPress plugin before 3.3.0 can be used to create new WordPress user accounts with a randomly generated password. The password is generated using the str_shuffle PHP function that \"does not generate cryptographically secure values, and should not be used for cryptographic purposes\" according to PHP's documentation.",
"published": "2021-12-27T11:15:09.517",
"affected_versions": "< 3.3.0",
"cpe_vendors": [
"simple_jwt_login_project:simple_jwt_login"
]
},
{
"cve_id": "CVE-2021-43824",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use regex in the JWT filter. Users are advised to upgrade.",
"published": "2022-02-22T23:15:10.813",
"affected_versions": "< 1.18.6, < 1.19.3, < 1.20.2",
"cpe_vendors": [
"envoyproxy:envoy"
]
},
{
"cve_id": "CVE-2022-22332",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "IBM Sterling Partner Engagement Manager 6.2.0 could allow an attacker to impersonate another user due to missing revocation mechanism for the JWT token. IBM X-Force ID: 219131.",
"published": "2022-04-01T17:15:09.897",
"affected_versions": "6.2.0",
"cpe_vendors": [
"ibm:partner_engagement_manager"
]
},
{
"cve_id": "CVE-2022-29266",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.",
"published": "2022-04-20T08:15:07.740",
"affected_versions": "< 2.13.1",
"cpe_vendors": [
"apache:apisix"
]
},
{
"cve_id": "CVE-2022-36065",
"cvss_score": 7.5,
"severity": "HIGH",
"description": "GrowthBook is an open-source platform for feature flagging and A/B testing. With some self-hosted configurations in versions prior to 2022-08-29, attackers can register new accounts and upload files to arbitrary directories within the container. If the attacker uploads a Python script to the right location, they can execute arbitrary code within the container. To be affected, ALL of the following must be true: Self-hosted deployment (GrowthBook Cloud is unaffected); using local file uploads (as ",
"published": "2022-09-06T21:15:08.760",
"affected_versions": "< 1.6.0",
"cpe_vendors": [
"growthbook:growthbook"
]
},
{
"cve_id": "CVE-2018-15801",
"cvss_score": 7.4,
"severity": "HIGH",
"description": "Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.",
"published": "2018-12-19T22:29:00.593",
"affected_versions": "< 5.1.2",
"cpe_vendors": [
"vmware:spring_framework"
]
},
{
"cve_id": "CVE-2020-15240",
"cvss_score": 7.4,
"severity": "HIGH",
"description": "omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Co",
"published": "2020-10-21T18:15:12.813",
"affected_versions": "< 2.4.1",
"cpe_vendors": [
"auth0:omniauth-auth0"
]
},
{
"cve_id": "CVE-2021-39177",
"cvss_score": 7.4,
"severity": "HIGH",
"description": "Geyser is a bridge between Minecraft: Bedrock Edition and Minecraft: Java Edition. Versions of Geyser prior to 1.4.2-SNAPSHOT allow anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any user. Version 1.4.2-SNAPSHOT contains a patch for the issue. There are no known workarounds aside from upgrading.",
"published": "2021-08-30T23:15:07.070",
"affected_versions": "< 1.4.2",
"cpe_vendors": [
"geysermc:geyser"
]
},
{
"cve_id": "CVE-2022-29217",
"cvss_score": 7.4,
"severity": "HIGH",
"description": "PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has t",
"published": "2022-05-24T15:15:07.767",
"affected_versions": "< 2.4.0, 35, 36",
"cpe_vendors": [
"pyjwt_project:pyjwt",
"fedoraproject:fedora"
]
},
{
"cve_id": "CVE-2019-13483",
"cvss_score": 7.3,
"severity": "HIGH",
"description": "Auth0 Passport-SharePoint before 0.4.0 does not validate the JWT signature of an Access Token before processing. This allows attackers to forge tokens and bypass authentication and authorization mechanisms.",
"published": "2019-07-25T20:15:11.730",
"affected_versions": "< 0.4.0",
"cpe_vendors": [
"auth0:passport-sharepoint"
]
},
{
"cve_id": "CVE-2020-8595",
"cvss_score": 7.3,
"severity": "HIGH",
"description": "Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a URI that would otherwise satisfy an exact-path match.",
"published": "2020-02-12T15:15:14.727",
"affected_versions": "<= 1.3.7, <= 1.4.3, 1.0",
"cpe_vendors": [
"istio:istio",
"redhat:openshift_service_mesh"
]
},
{
"cve_id": "CVE-2021-41803",
"cvss_score": 7.1,
"severity": "HIGH",
"description": "HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2.\"",
"published": "2022-09-23T01:15:08.623",
"affected_versions": "< 1.11.9, < 1.11.9, 1.12.4",
"cpe_vendors": [
"hashicorp:consul"
]
},
{
"cve_id": "CVE-2020-1762",
"cvss_score": 7.0,
"severity": "HIGH",
"description": "An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.",
"published": "2020-04-27T21:15:13.717",
"affected_versions": "< 1.15.1, 1.0",
"cpe_vendors": [
"kiali:kiali",
"redhat:openshift_service_mesh"
]
},
{
"cve_id": "CVE-2016-10555",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "Since \"algorithm\" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.",
"published": "2018-05-31T20:29:02.067",
"affected_versions": "<= 0.3.0",
"cpe_vendors": [
"jwt-simple_project:jwt-simple"
]
},
{
"cve_id": "CVE-2018-11537",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "Auth0 angular-jwt before 0.1.10 treats whiteListedDomains entries as regular expressions, which allows remote attackers with knowledge of the jwtInterceptorProvider.whiteListedDomains setting to bypass the domain whitelist filter via a crafted domain.",
"published": "2018-06-19T19:29:00.377",
"affected_versions": "< 0.1.10",
"cpe_vendors": [
"auth0:angular-jwt"
]
},
{
"cve_id": "CVE-2021-3167",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "In Cloudera Data Engineering (CDE) 1.3.0, JWT authentication tokens are exposed to administrators in virtual cluster server logs.",
"published": "2021-03-15T16:15:13.810",
"affected_versions": "1.3.0",
"cpe_vendors": [
"cloudera:data_engineering"
]
},
{
"cve_id": "CVE-2021-26074",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions from version 1.1.0 before version 2.1.3 erroneously accept context JWTs in lifecycle endpoints (such as installation) where ",
"published": "2021-04-16T03:15:12.113",
"affected_versions": "< 2.1.3",
"cpe_vendors": [
"atlassian:connect_spring_boot"
]
},
{
"cve_id": "CVE-2020-36124",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by XML External Entity (XXE) injection. An authenticated attacker can compromise the private keys of a JWT token and reuse them to manipulate the access tokens to access the platform as any desired user (clients and administrators).",
"published": "2021-05-07T11:15:08.040",
"affected_versions": "<= 7.0.8_20200511171508",
"cpe_vendors": [
"paxtechnology:paxstore"
]
},
{
"cve_id": "CVE-2021-32631",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "Common is a package of common modules that can be accessed by NIMBLE services. Common before commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 did not properly verify the signature of JSON Web Tokens. This allows someone to forge a valid JWT. Being able to forge JWTs may lead to authentication bypasses. Commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 contains a patch for the issue. As a workaround, one may use the parseClaimsJws method to correctly verify the signature of a JWT.",
"published": "2021-07-26T16:15:07.637",
"affected_versions": "",
"cpe_vendors": [
"nimble-project:common"
]
},
{
"cve_id": "CVE-2021-23207",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users.",
"published": "2022-01-21T19:15:08.063",
"affected_versions": "<= d25, <= 3.3.0, 1.0",
"cpe_vendors": [
"fresenius-kabi:agilia_connect",
"fresenius-kabi:agilia_partner_maintenance_software",
"fresenius-kabi:vigilant_centerium",
"fresenius-kabi:vigilant_insight",
"fresenius-kabi:vigilant_mastermed",
"fresenius-kabi:link\\+_agilia_firmware"
]
},
{
"cve_id": "CVE-2022-22311",
"cvss_score": 6.5,
"severity": "MEDIUM",
"description": "IBM Security Verify Access could allow a user, using man in the middle techniques, to obtain sensitive information or possibly change some information due to improper validiation of JWT tokens.",
"published": "2022-03-31T18:15:09.437",
"affected_versions": "10.0.0, 10.0.1, 10.0.2",
"cpe_vendors": [
"ibm:security_verify_access"
]
},
{
"cve_id": "CVE-2020-10689",
"cvss_score": 6.4,
"severity": "MEDIUM",
"description": "A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the target pod.",
"published": "2020-04-03T15:15:14.420",
"affected_versions": "< 7.9.0",
"cpe_vendors": [
"eclipse:che"
]
},
{
"cve_id": "CVE-2021-41130",
"cvss_score": 6.4,
"severity": "MEDIUM",
"description": "Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header \"X-Endpoint-API-UserInfo\", the application can use it to do authorization. But if there are two \"X-Endpoint-API-UserInfo\" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two ",
"published": "2021-10-07T19:15:08.843",
"affected_versions": "< 1.58.0",
"cpe_vendors": [
"google:extensible_service_proxy"
]
},
{
"cve_id": "CVE-2021-3509",
"cvss_score": 6.1,
"severity": "MEDIUM",
"description": "A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.",
"published": "2021-05-27T00:15:08.577",
"affected_versions": "4.0",
"cpe_vendors": [
"redhat:ceph_storage"
]
},
{
"cve_id": "CVE-2017-8932",
"cvss_score": 5.9,
"severity": "MEDIUM",
"description": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.",
"published": "2017-07-06T16:29:00.420",
"affected_versions": "<= 1.7.5, 1.8, 1.8.1",
"cpe_vendors": [
"golang:go",
"novell:suse_package_hub_for_suse_linux_enterprise",
"fedoraproject:fedora",
"opensuse:leap"
]
},
{
"cve_id": "CVE-2018-8023",
"cvss_score": 5.9,
"severity": "MEDIUM",
"description": "Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation fun",
"published": "2018-09-21T13:29:01.140",
"affected_versions": "< 1.4.2, 1.5.0, 1.5.1",
"cpe_vendors": [
"apache:mesos"
]
},
{
"cve_id": "CVE-2021-26833",
"cvss_score": 5.9,
"severity": "MEDIUM",
"description": "Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.",
"published": "2021-04-06T16:15:16.457",
"affected_versions": "<= 1.7.0, <= 1.21.115",
"cpe_vendors": [
"timelybills:timelybills"
]
},
{
"cve_id": "CVE-2021-33846",
"cvss_score": 5.9,
"severity": "MEDIUM",
"description": "Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonate arbitrary users.",
"published": "2022-01-21T19:15:09.007",
"affected_versions": "<= 3.3.0, 1.0, 1.0",
"cpe_vendors": [
"fresenius-kabi:agilia_partner_maintenance_software",
"fresenius-kabi:vigilant_centerium",
"fresenius-kabi:vigilant_insight",
"fresenius-kabi:vigilant_mastermed",
"fresenius-kabi:agilia_connect_firmware",
"fresenius-kabi:link\\+_agilia_firmware"
]
},
{
"cve_id": "CVE-2020-5300",
"cvss_score": 5.8,
"severity": "MEDIUM",
"description": "In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: \"A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties\". Hydra does not check the uniqueness of this `jti` value. Exploitin",
"published": "2020-04-06T17:15:13.367",
"affected_versions": "< 1.4.0",
"cpe_vendors": [
"ory:hydra"
]
},
{
"cve_id": "CVE-2021-25993",
"cvss_score": 5.4,
"severity": "MEDIUM",
"description": "In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attacker’s server and will lead to account takeover when accessed by the victim.",
"published": "2021-12-29T17:15:07.483",
"affected_versions": "<= 2.5.255, 2.0.0, 2.0.0",
"cpe_vendors": [
"requarks:wiki.js"
]
},
{
"cve_id": "CVE-2017-10862",
"cvss_score": 5.3,
"severity": "MEDIUM",
"description": "jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token.",
"published": "2017-10-12T14:29:00.263",
"affected_versions": "<= 1.2.2",
"cpe_vendors": [
"really:jwt-scala"
]
},
{
"cve_id": "CVE-2017-8031",
"cvss_score": 5.3,
"severity": "MEDIUM",
"description": "An issue was discovered in Cloud Foundry Foundation cf-release (all versions prior to v279) and UAA (30.x versions prior to 30.6, 45.x versions prior to 45.4, 52.x versions prior to 52.1). In some cases, the UAA allows an authenticated user for a particular client to revoke client tokens for other users on the same client. This occurs only if the client is using opaque tokens or JWT tokens validated using the check_token endpoint. A malicious actor could cause denial of service.",
"published": "2017-11-27T10:29:00.767",
"affected_versions": "<= 278, < 30.6, < 45.4",
"cpe_vendors": [
"cloudfoundry:cf-release",
"cloudfoundry:uaa-release"
]
},
{
"cve_id": "CVE-2020-4072",
"cvss_score": 5.3,
"severity": "MEDIUM",
"description": "In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.",
"published": "2020-06-25T20:15:11.350",
"affected_versions": "< 1.7.0",
"cpe_vendors": [
"jhipster:generator-jhipster-kotlin"
]
},
{
"cve_id": "CVE-2020-28042",
"cvss_score": 5.3,
"severity": "MEDIUM",
"description": "ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.",
"published": "2020-11-02T21:15:31.320",
"affected_versions": "< 5.9.2",
"cpe_vendors": [
"servicestack:servicestack"
]
},
{
"cve_id": "CVE-2022-36083",
"cvss_score": 5.3,
"severity": "MEDIUM",
"description": "JOSE is \"JSON Web Almost Everything\" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node.js, Browser, Cloudflare Workers, Electron, and Deno. The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` PBES2 Count, which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password br",
"published": "2022-09-07T22:15:08.657",
"affected_versions": "< 1.28.2, < 2.0.6, < 3.20.4",
"cpe_vendors": [
"jose_project:jose"
]
},
{
"cve_id": "CVE-2021-27884",
"cvss_score": 5.1,
"severity": "MEDIUM",
"description": "Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used.",
"published": "2021-03-01T23:15:13.267",
"affected_versions": "<= 1.9.2",
"cpe_vendors": [
"ymfe:yapi"
]
},
{
"cve_id": "CVE-2015-2951",
"cvss_score": 5.0,
"severity": "MEDIUM",
"description": "JWT.php in F21 JWT before 2.0 allows remote attackers to bypass signature verification via crafted tokens.",
"published": "2015-06-05T10:59:05.380",
"affected_versions": "<= 1.0",
"cpe_vendors": [
"f21:jwt"
]
},
{
"cve_id": "CVE-2022-31130",
"cvss_score": 4.9,
"severity": "MEDIUM",
"description": "Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication",
"published": "2022-10-13T23:15:09.637",
"affected_versions": "< 8.5.14, < 9.1.8",
"cpe_vendors": [
"grafana:grafana"
]
},
{
"cve_id": "CVE-2021-41106",
"cvss_score": 4.4,
"severity": "MEDIUM",
"description": "JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Vers",
"published": "2021-09-28T21:15:07.370",
"affected_versions": "< 3.4.6, < 4.0.4, < 4.1.5",
"cpe_vendors": [
"lcobucci:jwt"
]
},
{
"cve_id": "CVE-2020-26172",
"cvss_score": 4.2,
"severity": "MEDIUM",
"description": "Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.",
"published": "2020-12-18T10:15:12.710",
"affected_versions": "< 1.18.1",
"cpe_vendors": [
"tangro:business_workflow"
]
},
{
"cve_id": "CVE-2019-3868",
"cvss_score": 3.8,
"severity": "LOW",
"description": "Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.",
"published": "2019-04-24T16:29:02.373",
"affected_versions": "<= 6.0.0",
"cpe_vendors": [
"redhat:keycloak"
]
}
],
"search_mode": "keyword",
"_cached_at": 1778081355.1555667
} |