CVE-2022-23529

CVSS V2 None CVSS V3 None
Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none.
Overview
  • CVE ID
  • CVE-2022-23529
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Rejected
  • Published Version
  • 2022-12-21T21:15:09
  • Last Modified Date
  • 2023-01-27T22:15:08
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:* 1 OR 8.5.1
History
Created Old Value New Value Data Type Notes
2022-12-21 22:15:18 Added to TrackCVE
2022-12-21 22:15:19 Weakness Enumeration new
2022-12-22 04:16:49 2022-12-22T03:55:54 CVE Modified Date updated
2022-12-22 04:16:49 Received Awaiting Analysis Vulnerability Status updated
2022-12-23 15:14:53 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-30 22:15:21 2022-12-30T21:50:33 CVE Modified Date updated
2022-12-30 22:15:21 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-30 22:15:23 CPE Information updated
2023-01-27 22:16:28 2023-01-27T22:15:08 CVE Modified Date updated
2023-01-27 22:16:28 Analyzed Rejected Vulnerability Status updated
2023-01-27 22:16:29 node-jsonwebtoken is a JsonWebToken implementation for node.js. For versions `<= 8.5.1` of `jsonwebtoken` library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the `secretOrPublicKey` argument from the readme link of the `jwt.verify()` function, they can write arbitrary files on the host machine. Users are affected only if untrusted entities are allowed to modify the key retrieval parameter of the `jwt.verify()` on a host that you control. This issue has been fixed, please update to version 9.0.0. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none. Description updated