ID |
CVE-2016-10555
|
Sažetak |
Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants. |
Reference |
|
CVSS |
Base: | 4.0 |
Impact: | 2.9 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
PARTIAL |
NONE |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
Zadnje važnije ažuriranje |
09-10-2019 - 23:16 |
Objavljeno |
31-05-2018 - 20:29 |