CVE-2022-23540

CVSS V2 None CVSS V3 None
Description
In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. Users are affected if you do not specify algorithms in the `jwt.verify()` function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options.
Overview
  • CVE ID
  • CVE-2022-23540
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-12-22T19:15:08
  • Last Modified Date
  • 2023-02-27T19:56:08
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:* 1 OR 8.5.1
History
Created Old Value New Value Data Type Notes
2022-12-22 19:15:45 Added to TrackCVE
2022-12-22 19:15:46 Weakness Enumeration new
2022-12-22 22:15:01 2022-12-22T21:43:11 CVE Modified Date updated
2022-12-22 22:15:01 Received Awaiting Analysis Vulnerability Status updated
2022-12-23 16:18:44 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2022-12-29 20:14:59 2022-12-29T20:07:42 CVE Modified Date updated
2022-12-29 20:14:59 Undergoing Analysis Analyzed Vulnerability Status updated
2022-12-29 20:15:00 Weakness Enumeration update
2022-12-29 20:15:01 CPE Information updated
2023-02-27 20:13:50 2023-02-27T19:56:08 CVE Modified Date updated