[GHSA-88q6-jcjg-hvmw] jose-swift has JWT Signature Verification Bypass via None Algorithm#7237
Conversation
|
Hi there @beatt83! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
|
Hi there beatt83 👋 😊 (no ping to avoid extra mails) I ran into an outdated dependency today and noticed that you have a fix in place but the scanner didn't report it. I thought changing it here directly would be easier than first opening a ticket in your repository, I really didn't mean to raise the severity. Hopefully I didn't cause too much trouble. Have a nice day 😊 |
|
Hi @alex-security-guy! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Updates
Comments
I only wanted to add a patched version, PLEASE do not take in the CVSS change. Somehow the exploit maturity being PoC is not accepted anymore, some verifier somewhere must have changed...
In any case, fixed version is 6.0.2, the changes are linked.
Thx much and have a nice day.