jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
References
Link | Resource |
---|---|
https://github.com/dgrijalva/jwt-go/pull/426 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 | Third Party Advisory |
https://github.com/dgrijalva/jwt-go/pull/426 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dgrijalva/jwt-go/pull/426 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 - Third Party Advisory |
Information
Published : 2020-09-30 18:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26160
Mitre link : CVE-2020-26160
CVE.ORG link : CVE-2020-26160
JSON object : View
Products Affected
jwt-go_project
- jwt-go