This Week in Spring – January 9th, 2023

Hi, Spring fans! As I write this I'm on a plane winging my way to Helsinki, Finland. A new year and new journeys begin. It's going to be cold there. Wish me luck! Do you know what always warms me up? ...

Continue Reading
Critical Security Flaw Found in “jsonwebtoken” Library Used by 22,000+ Projects

[![high-severity security flaw](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() A high-severity security flaw has been disclosed ...

Continue Reading
Timing Attack

github.com/robbert229/jwt is vulnerable to Timing Attacks. A remote attacker is able to determine the expected hash-based message authentication code(HMAC) with a large enough number of requests over ...

Continue Reading
Use of Hard-coded Credentials

KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker ...

Continue Reading
KubePi allows malicious actor to login with a forged JWT token via Hardcoded Jwtsigkeys

### Summary The jwt authentication function of kubepi Read More ...

Continue Reading
JwtSigKey hardcoded causes the k8s cluster to take over

# Description The jwt authentication function of kubepi Read More ...

Continue Reading
CVE-2023-22463

KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker ...

Continue Reading
robbert229/jwt’s token validation methods vulnerable to a timing side-channel during HMAC comparison

Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine th ...

Continue Reading

Back to Main

Subscribe for the latest news: