File reference keys leads to incorrect hashes on HMAC algorithms
Package
Affected versions
>= 3.4.0, < 3.4.6
>= 4.0.0, < 4.0.4
>= 4.1.0, < 4.1.5
Patched versions
3.4.6
4.0.4
4.1.5
Description
Published by the National Vulnerability Database
Sep 28, 2021
Reviewed
Sep 28, 2021
Published to the GitHub Advisory Database
Sep 29, 2021
Last updated
Feb 6, 2024
Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with
Lcobucci\JWT\Signer\Key\LocalFileReference
as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.The HMAC hashing functions take any string as input and, since users can issue and validate tokens, people are lead to believe that everything works properly.
Patches
All versions have been patched to always load the file contents, deprecated the
Lcobucci\JWT\Signer\Key\LocalFileReference
, and suggestLcobucci\JWT\Signer\Key\InMemory
as the alternative.Workarounds
Use
Lcobucci\JWT\Signer\Key\InMemory
instead ofLcobucci\JWT\Signer\Key\LocalFileReference
to create the instances of your keys:References