CVE-2015-9235
Summary
| CVE | CVE-2015-9235 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-05-29 20:29:00 UTC |
| Updated | 2019-10-09 23:15:00 UTC |
| Description | In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family). |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Critical vulnerabilities in JSON Web Token libraries |
MISC |
www.timmclean.net |
Exploit, Third Party Advisory |
| Critical vulnerabilities in JSON Web Token libraries |
MISC |
auth0.com |
Broken Link, Vendor Advisory |
| Verification with an asymmetric key of a token signed with a symmetri… · auth0/node-jsonwebtoken@1bb584b · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Overview |
MISC |
nodesecurity.io |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 983931 Nodejs (npm) Security Update for jsonwebtoken (GHSA-c7hr-j4mj-j2w6)