You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It appears based on my tests that if the header algorithm is set to "none" and the signature is left blank, then the parsing of the JWT is successful. For implementations that don't explicitly check that the algorithm matches (see issue 320 #320) a user could gain access to another user's information by passing whatever they like in the claims portion of the payload.
Kind Regards,
The text was updated successfully, but these errors were encountered:
When reviewing security vulnerabilities for JWT I came across the following article hosted on auth0.com
https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
It appears based on my tests that if the header algorithm is set to "none" and the signature is left blank, then the parsing of the JWT is successful. For implementations that don't explicitly check that the algorithm matches (see issue 320 #320) a user could gain access to another user's information by passing whatever they like in the claims portion of the payload.
Kind Regards,
The text was updated successfully, but these errors were encountered: