CVE-2016-7037

Published on: 01/23/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of Jwt from Jwt Project contain the following vulnerability:

The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.

  • CVE-2016-7037 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE PARTIAL NONE

CVE References

Description Tags Link
Release v1.0.3 · emarref/jwt · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/emarref/jwt/releases/tag/1.0.3
jwt CVE-2016-7037 Security Bypass Vulnerability cve.report (archive)
text/html
URL Logo BID 95847
Use timing-safe hash comparision by emarref · Pull Request #20 · emarref/jwt · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/emarref/jwt/pull/20

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationJwt ProjectJwtAllAllAllAll
  • cpe:2.3:a:jwt_project:jwt:*:*:*:*:*:*:*:*: