CVE-2020-26160 — Improper Authentication in Dgrijalva Jwt-go V4
Severity
7.5HIGHNVD
EPSS
0.1%
top 82.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 30
Latest updateMay 18
Description
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3Microsoft▶
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fail↗2020-09-08
Debian▶
CVE-2020-26160: golang-github-dgrijalva-jwt-go - jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrict...↗2020