jsonwebtoken has insecure input validation in jwt.verify function #21
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
⚠️
dependabot-gitlabhas detected security vulnerability forjsonwebtokenin path:/, manifest_file:/package.jsonbut was unable to update it! ⚠️GHSA-27h2-hvpr-p74q,CVE-2022-23529Description
Overview
For versions
<=8.5.1ofjsonwebtokenlibrary, if a malicious actor has the ability to modify the key retrieval parameter (referring to thesecretOrPublicKeyargument from the readme link) of thejwt.verify()function, they can gain remote code execution (RCE).Am I affected?
You are affected only if you allow untrusted entities to modify the key retrieval parameter of the
jwt.verify()on a host that you control.How do I fix it?
Update to version 9.0.0
Will the fix impact my users?
The fix has no impact on end users.
Credits
Palo Alto Networks
References