CVE-2021-41803

HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1 ...

Continue Reading
Authorization Bypass

jwcrypto is vulnerable to authorization bypass. The vulnerability is due to JWT auto-detecting the token type; under certain circumstances, it's possible to substitute a signed JWS token with a JWE to ...

Continue Reading
python-jwt vulnerable to token forgery with new claims

### Impact An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's ...

Continue Reading
python-jwt vulnerable to token forgery with new claims

### Impact An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's ...

Continue Reading
jwcrypto token substitution can lead to authentication bypass

The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we rece ...

Continue Reading
jwcrypto token substitution can lead to authentication bypass

The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we rece ...

Continue Reading
CATS – REST API Fuzzer And Negative Testing Tool For OpenAPI Endpoints

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijvy3n-CUsr6eXUhIe7PiBAVW-U_NTyQqMshhgs6BpUgBZrLhdokmYQmNrP26tUz5yCsbDyLwcbgc5mI7e9iQJtW4fvkcasfLgQ8O_6uDXCYuL0BKt-ba5HFecsH-61bqdyp1Mqa ...

Continue Reading
User Enumeration via Response Timing

# Description There is a significant timing difference in the login functionality for valid and invalid usernames. # Proof of Concept Steps to reproduce: ``` 1. Attempt a Login with a valid user and a ...

Continue Reading

Back to Main

Subscribe for the latest news: