HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1 ...
Continue ReadingSeptember 22, 2022
jwcrypto is vulnerable to authorization bypass. The vulnerability is due to JWT auto-detecting the token type; under certain circumstances, it's possible to substitute a signed JWS token with a JWE to ...
Continue ReadingSeptember 22, 2022
### Impact An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's ...
Continue ReadingSeptember 21, 2022
### Impact An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's ...
Continue ReadingSeptember 21, 2022
The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we rece ...
Continue ReadingSeptember 21, 2022
The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we rece ...
Continue ReadingSeptember 21, 2022
[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijvy3n-CUsr6eXUhIe7PiBAVW-U_NTyQqMshhgs6BpUgBZrLhdokmYQmNrP26tUz5yCsbDyLwcbgc5mI7e9iQJtW4fvkcasfLgQ8O_6uDXCYuL0BKt-ba5HFecsH-61bqdyp1Mqa ...
Continue ReadingSeptember 19, 2022
# Description There is a significant timing difference in the login functionality for valid and invalid usernames. # Proof of Concept Steps to reproduce: ``` 1. Attempt a Login with a valid user and a ...
Continue ReadingSeptember 17, 2022
Back to Main