Lucene search

K
cve[email protected]CVE-2023-23928
HistoryFeb 01, 2023 - 1:15 a.m.

CVE-2023-23928

2023-02-0101:15:09
CWE-347
web.nvd.nist.gov
79
reason-jose
jose implementation
authorization bypass
privilege escalation
security vulnerability
nvd
cve-2023-23928

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%

reason-jose is a JOSE implementation in ReasonML and OCaml.Jose.Jws.validate does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.

Affected configurations

Vulners
NVD
Node
ulrikstridreason_joseRange<0.8.2

CNA Affected

[
  {
    "vendor": "ulrikstrid",
    "product": "reason-jose",
    "versions": [
      {
        "version": "< 0.8.2",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

51.1%

Related for CVE-2023-23928