{"api_version":"1","generated_at":"2026-04-22T23:08:36+00:00","cve":"CVE-2020-15222","urls":{"html":"https://cve.report/CVE-2020-15222","api":"https://cve.report/api/cve/CVE-2020-15222.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-15222","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-15222"},"summary":{"title":"CVE-2020-15222","description":"In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using \"private_key_jwt\" authentication the uniqueness of the `jti` value is not checked. When using client authentication method \"private_key_jwt\", OpenId specification says the following about assertion `jti`: \"A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties\". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-09-24 17:15:00","updated_at":"2021-11-18 17:51:00"},"problem_types":["CWE-345"],"metrics":[],"references":[{"url":"https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication","name":"https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication","refsource":"MISC","tags":["Third Party Advisory"],"title":"Draft: OpenID Connect Core 1.0 - draft 11","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43","name":"https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43","refsource":"CONFIRM","tags":["Exploit","Third Party Advisory"],"title":"Disallow replay of `private_key_jwt` by blacklisting JTIs · Advisory · ory/fosite · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9","name":"https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Merge pull request from GHSA-v3q9-2p3m-7g43 · ory/fosite@0c9e0f6 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-15222","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15222","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"15222","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ory","cpe5":"fosite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15222","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ory","cpe5":"fosite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-15222","qid":"980047","title":"Go (go) Security Update for github.com/ory/fosite (GHSA-v3q9-2p3m-7g43)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-15222","STATE":"PUBLIC","TITLE":"Replay of private_key_jwt possible in ORY Fosite"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"fosite","version":{"version_data":[{"version_value":"< 0.31.0"}]}}]},"vendor_name":"ory"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using \"private_key_jwt\" authentication the uniqueness of the `jti` value is not checked. When using client authentication method \"private_key_jwt\", OpenId specification says the following about assertion `jti`: \"A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties\". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication"}]}]},"references":{"reference_data":[{"name":"https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43","refsource":"CONFIRM","url":"https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43"},{"name":"https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9","refsource":"MISC","url":"https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9"},{"name":"https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication","refsource":"MISC","url":"https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication"}]},"source":{"advisory":"GHSA-v3q9-2p3m-7g43","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-09-24 17:15:00","lastModifiedDate":"2021-11-18 17:51:00","problem_types":["CWE-345"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ory:fosite:*:*:*:*:*:*:*:*","versionEndExcluding":"0.31.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"15222","Ordinal":"176601","Title":"CVE-2020-15222","CVE":"CVE-2020-15222","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"15222","Ordinal":"1","NoteData":"In ORY Fosite (the security first OAuth2 & OpenID Connect framework for Go) before version 0.31.0, when using \"private_key_jwt\" authentication the uniqueness of the `jti` value is not checked. When using client authentication method \"private_key_jwt\", OpenId specification says the following about assertion `jti`: \"A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties\". Hydra does not seem to check the uniqueness of this `jti` value. This problem is fixed in version 0.31.0.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"15222","Ordinal":"2","NoteData":"2020-09-24","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"15222","Ordinal":"3","NoteData":"2020-09-24","Type":"Other","Title":"Modified"}]}}}