Site icon API Security Blog

Critical Security Flaw Found in “jsonwebtoken” Library Used by 22,000+ Projects

[![high-severity security flaw](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]()

A high-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that, if successfully exploited, could lead to remote code execution on a target server.

“By exploiting this [vulnerability](), attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted JSON web token (JWT) request,” Palo Alto Networks Unit 42 researcher Artur Oleyarsh [said]() in a Monday report.

Tracked as [**CVE-2022-23529**]() (CVSS score: 7.6), the issue impacts all versions of the library, including and below 8.5.1, and has been addressed in [version 9.0.0]() shipped on December 21, 2022. The flaw was reported by the cybersecurity company on July 13, 2022.

jsonwebtoken, which is [developed and maintained]() by Okta’s Auth0, is a JavaScript module that allows users to decode, verify, and generate JSON web tokens as a means of securely transmitting information between two parties for authorization and authentication. It has over [10 million weekly downloads]() on the npm software registry and is used by over 22,000 projects.

Therefore, the ability to run malicious code on a server could break confidentiality and integrity guarantees, potentially enabling a bad actor to overwrite arbitrary files on the host and perform any action of their choosing using a poisoned secret key.

[![high-severity security flaw](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]()

“With that being said, in order to exploit the vulnerability described in this post and control the [secretOrPublicKey value](), an attacker will need to exploit a flaw within the secret management process,” Oleyarsh explained.

As open source software increasingly emerges as a lucrative initial access pathway for threat actors to stage supply chain attacks, it’s crucial that vulnerabilities in such tools are proactively identified, mitigated, and patched by downstream users.

Making matters worse is the fact that cybercriminals have become much faster at exploiting newly revealed flaws, drastically shrinking the time between a patch release and exploit availability. According to Microsoft, it only takes [14 days on average]() for an exploit to be detected in the wild after public disclosure of a bug.

To combat this problem of vulnerability discovery, Google, last month, announced the release of [OSV-Scanner](), an open source utility that aims to identify all transitive dependencies of a project and highlight relevant shortcomings impacting it.

Found this article interesting? Follow us on [Twitter __]() and [LinkedIn]() to read more exclusive content we post.Read More

Exit mobile version