Nov json-jwt version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Json-jwt | Json-jwt_project | 0.5.0 (including) | 1.9.4 (excluding) |
Ruby-json-jwt | Ubuntu | bionic | * |
Ruby-json-jwt | Ubuntu | esm-apps/bionic | * |
Ruby-json-jwt | Ubuntu | trusty | * |
Ruby-json-jwt | Ubuntu | upstream | * |