CVE Vulnerabilities

CVE-2024-53861

Incorrect Comparison

Published: Nov 29, 2024 | Modified: Sep 22, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
2.2 LOW
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM

pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for iss checking, resulting in acb being accepted for _abc_. This is a bug introduced in version 2.10.0: checking the iss claim changed from isinstance(issuer, list) to isinstance(issuer, Sequence). Since str is a Sequnce, but not a list, in is also used for string comparison. This results in if abc not in __abcd__: being checked instead of if abc != __abc__:. Signature checks are still present so real world impact is likely limited to denial of service scenarios. This issue has been patched in version 2.10.1. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

The product compares two entities in a security-relevant context, but the comparison is incorrect.

Affected Software

Name Vendor Start Version End Version
Pyjwt Pyjwt_project 2.10.0 (including) 2.10.0 (including)

Extended Description

This Pillar covers several possibilities:

References