Lucene search

K
nvd[email protected]NVD:CVE-2022-23540
HistoryDec 22, 2022 - 7:15 p.m.

CVE-2022-23540

2022-12-2219:15:08
CWE-287
CWE-347
web.nvd.nist.gov
7
jsonwebtoken
library
version 8.5.1
signature validation
algorithm
cve-2022-23540

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

EPSS

0.001

Percentile

38.1%

In versions <=8.5.1 of jsonwebtoken library, lack of algorithm definition in the jwt.verify() function can lead to signature validation bypass due to defaulting to the none algorithm for signature verification. Users are affected if you do not specify algorithms in the jwt.verify() function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the jwt.verify() method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the none algorithm. If you need β€˜none’ algorithm, you have to explicitly specify that in jwt.verify() options.

Affected configurations

Nvd
Node
auth0jsonwebtokenRange≀8.5.1node.js
VendorProductVersionCPE
auth0jsonwebtoken*cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:*

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

EPSS

0.001

Percentile

38.1%