jsonwebtoken has insecure input validation in jwt.verify function #21

Closed
opened 2022-12-23 04:43:31 +00:00 by argoyle · 0 comments
argoyle commented 2022-12-23 04:43:31 +00:00 (Migrated from gitlab.com)

⚠️ dependabot-gitlab has detected security vulnerability for jsonwebtoken in path: /, manifest_file: /package.json but was unable to update it! ⚠️

Package Severity Affected versions Patched versions IDs
jsonwebtoken (NPM) HIGH <= 8.5.1 9.0.0 GHSA-27h2-hvpr-p74q,CVE-2022-23529

Description

Overview

For versions <=8.5.1 of jsonwebtoken library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the secretOrPublicKey argument from the readme link) of the jwt.verify() function, they can gain remote code execution (RCE).

Am I affected?

You are affected only if you allow untrusted entities to modify the key retrieval parameter of the jwt.verify() on a host that you control.

How do I fix it?

Update to version 9.0.0

Will the fix impact my users?

The fix has no impact on end users.

Credits

Palo Alto Networks

References

⚠️ `dependabot-gitlab` has detected security vulnerability for `jsonwebtoken` in path: `/`, manifest_file: `/package.json` but was unable to update it! ⚠️ * https://github.com/advisories/GHSA-27h2-hvpr-p74q | Package | Severity | Affected versions | Patched versions | IDs | |--------------------|----------|-------------------|------------------|----------------------------------------| | jsonwebtoken (NPM) | HIGH | <= 8.5.1 | 9.0.0 | `GHSA-27h2-hvpr-p74q`,`CVE-2022-23529` | # Description # Overview For versions `<=8.5.1` of `jsonwebtoken` library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the `secretOrPublicKey` argument from the [readme link](https://github.com/auth0/node-jsonwebtoken#jwtverifytoken-secretorpublickey-options-callback)) of the `jwt.verify()` function, they can gain remote code execution (RCE). # Am I affected? You are affected only if you allow untrusted entities to modify the key retrieval parameter of the `jwt.verify()` on a host that you control. # How do I fix it? Update to version 9.0.0 # Will the fix impact my users? The fix has no impact on end users. # Credits [Palo Alto Networks](https://www.paloaltonetworks.com/) # References * https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-27h2-hvpr-p74q * https://nvd.nist.gov/vuln/detail/CVE-2022-23529 * https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3 * https://github.com/advisories/GHSA-27h2-hvpr-p74q
argoyle (Migrated from gitlab.com) closed this issue 2023-06-02 14:10:40 +00:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: dancefinder/dancefinder-app#21