mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
44 lines
1.7 KiB
JSON
44 lines
1.7 KiB
JSON
{
|
|
"id": "CVE-2024-31033",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-04-01T02:15:07.850",
|
|
"lastModified": "2024-05-17T02:38:58.313",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"tags": [
|
|
"disputed"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class. NOTE: the vendor disputes this because the \"ignores\" behavior cannot occur (in any version) unless there is a user error in how JJWT is used, and because the version that was actually tested must have been more than six years out of date."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "JJWT (tambi\u00e9n conocido como Java JWT) hasta 0.12.5 ignora ciertos caracteres y, por lo tanto, un usuario podr\u00eda concluir err\u00f3neamente que tiene una clave segura. El c\u00f3digo afectado es el m\u00e9todo setSigningKey() dentro de la clase DefaultJwtParser y el m\u00e9todo signWith() dentro de la clase DefaultJwtBuilder."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/2308652512/JJWT_BUG",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/jwtk/jjwt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.viralpatel.net/java-create-validate-jwt-token/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |