Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15084
HistoryJun 30, 2020 - 4:10 p.m.

CVE-2020-15084 Authorization bypass in express-jwt

2020-06-3016:10:12
CWE-285
GitHub_M
www.cve.org

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.3%

In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this vulnerability if all of the following conditions apply: - You are using express-jwt - You do not have algorithms configured in your express-jwt configuration. - You are using libraries such as jwks-rsa as thesecret. You can fix this by specifyingalgorithms in the express-jwt configuration. See linked GHSA for example. This is also fixed in version 6.0.0.

CNA Affected

[
  {
    "product": "express-jwt",
    "vendor": "auth0",
    "versions": [
      {
        "status": "affected",
        "version": "<= 5.3.3"
      }
    ]
  }
]

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.3%

Related for CVELIST:CVE-2020-15084