-
Notifications
You must be signed in to change notification settings - Fork 4
Description
Vulnerable Package issue exists @ Go-github.zerozr99.workers.dev/dgrijalva/jwt-go-v3.2.0 in branch main
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Namespace: Yoavast
Repository: CX-AST
Repository Url: https://github.com/Yoavast/CX-AST
CxAST-Project: Yoavast/CX-AST
CxAST platform scan: bab150cb-39a8-4b7b-832e-7d0f634f8d37
Branch: main
Application: CX-AST
Severity: HIGH
State: NOT_IGNORED
Status: RECURRENT
CWE: CWE-755
Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: HIGH
Availability impact: NONE
Remediation Upgrade Recommendation: v3.2.1-0.20180308231308-06ea1031745c+incompatible
References
Advisory
Advisory
Pull request
Issue