You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
mend-bolt-for-githubbot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0 - autoclosed
Aug 30, 2021
CVE-2020-26160 - High Severity Vulnerability
Vulnerable Library - github.com/dgrijalva/jwt-go-v3.2.0
Golang implementation of JSON Web Tokens (JWT)
Dependency Hierarchy:
Found in HEAD commit: 2f502d92c37734e5b9041ee221c0e42063c1c469
Found in base branch: main
Vulnerability Details
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Publish Date: 2020-09-30
URL: CVE-2020-26160
CVSS 3 Score Details (7.5)
Base Score Metrics:
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: