CVE-2020-26160

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jwt-go_project:jwt-go:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://github.com/dgrijalva/jwt-go/pull/426 - Patch, Third Party Advisory () https://github.com/dgrijalva/jwt-go/pull/426 - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 - Third Party Advisory () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 - Third Party Advisory

Information

Published : 2020-09-30 18:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26160

Mitre link : CVE-2020-26160

CVE.ORG link : CVE-2020-26160


JSON object : View

Products Affected

jwt-go_project

  • jwt-go
CWE
CWE-287

Improper Authentication

CWE-755

Improper Handling of Exceptional Conditions