Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Specifying algorithm as none and empty signature #331

Closed
paymentplugins opened this issue Jun 18, 2018 · 2 comments
Closed

Specifying algorithm as none and empty signature #331

paymentplugins opened this issue Jun 18, 2018 · 2 comments

Comments

@paymentplugins
Copy link

paymentplugins commented Jun 18, 2018

When reviewing security vulnerabilities for JWT I came across the following article hosted on auth0.com

https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/

It appears based on my tests that if the header algorithm is set to "none" and the signature is left blank, then the parsing of the JWT is successful. For implementations that don't explicitly check that the algorithm matches (see issue 320 #320) a user could gain access to another user's information by passing whatever they like in the claims portion of the payload.

Kind Regards,

@lhazlewood
Copy link
Contributor

Have you looked at #20, #36, #47, #119 and #202 ? ;)

@paymentplugins
Copy link
Author

Thank you for the response and apologies for not going further back in the issues log.

Kind Regards,

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants