CVE Vulnerabilities

CVE-2019-1010263

Improper Verification of Cryptographic Signature

Published: Jul 17, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Perl_crypt::jwtPerl_crypt::jwt_project*0.023 (excluding)
Libcrypt-jwt-perlUbuntudisco*
Libcrypt-jwt-perlUbuntueoan*
Libcrypt-jwt-perlUbuntufocal*
Libcrypt-jwt-perlUbuntugroovy*
Libcrypt-jwt-perlUbuntuhirsute*
Libcrypt-jwt-perlUbuntuimpish*
Libcrypt-jwt-perlUbuntukinetic*
Libcrypt-jwt-perlUbuntulunar*
Libcrypt-jwt-perlUbuntumantic*
Libcrypt-jwt-perlUbuntuoracular*
Libcrypt-jwt-perlUbuntuplucky*
Libcrypt-jwt-perlUbuntutrusty*

References