cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks by crafting a JWT with an enc header with the value A256GCM.
References
Configurations
No configuration.
History
21 Nov 2024, 09:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cdbattags/lua-resty-jwt/commit/d1558e2afefe868fea1e7e9a4b04ea94ab678a85 - | |
References | () https://github.com/cdbattags/lua-resty-jwt/issues/61 - | |
References | () https://insinuator.net/2023/10/lua-resty-jwt-authentication-bypass/ - |
03 Jul 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CWE | CWE-290 |
24 Apr 2024, 13:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Apr 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-24 06:15
Updated : 2024-11-21 09:17
NVD link : CVE-2024-33531
Mitre link : CVE-2024-33531
CVE.ORG link : CVE-2024-33531
JSON object : View
Products Affected
No product.
CWE
CWE-290
Authentication Bypass by Spoofing