Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a verify(token, algorithm, verificationKey) method as per this posting regarding vulnerabilities in jwt: https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ #14

Open
nethermead opened this issue Apr 1, 2015 · 3 comments

Comments

@nethermead
Copy link

No description provided.

@nethermead
Copy link
Author

It's good that you don't support the 'none' algorithm as per the JWT spec, but if the algorithm used can't be enforced by the server, exploits are feasible.

@thedufer
Copy link
Contributor

thedufer commented Jun 9, 2015

Looks like this can be closed as per #16

@benbotto
Copy link

Passing the algorithm should be shown in the readme, which someone has already recommended in #16. (In my opinion passing the algorithm should be required.) This issue caused a fairly severe security hole in my application because I use RS256.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants