CVE-2022-3102Jwcrypto vulnerability

2 documents2 sources
Severity
MEDIUM
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 21

Description

jwcrypto token substitution can lead to authentication bypass The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we received : "Under certain circumstances, it is possible to substitute a [..] signed JWS with a JWE that is encrypted with the public key that is normally used for signature validation." This substitution attack can occur only if the validati

Affected Packages1 packages

PyPIlatchset/jwcrypto< 1.4

🔴Vulnerability Details

2
GHSA
jwcrypto token substitution can lead to authentication bypass2022-09-21
OSV
jwcrypto token substitution can lead to authentication bypass2022-09-21
CVE-2022-3102 — Latchset Jwcrypto vulnerability | cvebase