mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
70 lines
2.4 KiB
JSON
70 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
|
"DATE_ASSIGNED" : "3/1/2018 18:13:33",
|
|
"ID" : "CVE-2018-1000125",
|
|
"REQUESTER" : "daniel@inversoft.com",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "prime-jwt",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "inversoft"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appear to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated. This vulnerability appears to have been fixed in 1.3.0 and later or after commit 0d94dcef0133d699f21d217e922564adbb83a227."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://github.com/inversoft/prime-jwt/blob/master/CHANGES",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://github.com/inversoft/prime-jwt/blob/master/CHANGES"
|
|
},
|
|
{
|
|
"name" : "https://github.com/inversoft/prime-jwt/issues/2",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://github.com/inversoft/prime-jwt/issues/2"
|
|
}
|
|
]
|
|
}
|
|
}
|