Vulnerability Details : CVE-2015-9235
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Vulnerability category: Input validation
Products affected by CVE-2015-9235
- cpe:2.3:a:auth0:jsonwebtoken:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-9235
0.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-9235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2015-9235
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: support@hackerone.com (Secondary)
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-9235
-
https://nodesecurity.io/advisories/17
npmThird Party Advisory
-
https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
Critical vulnerabilities in JSON Web Token librariesBroken Link;Vendor Advisory
-
https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
Verification with an asymmetric key of a token signed with a symmetri… · auth0/node-jsonwebtoken@1bb584b · GitHubPatch;Third Party Advisory
-
https://www.timmclean.net/2015/02/25/jwt-alg-none.html
Critical vulnerabilities in JSON Web Token librariesExploit;Third Party Advisory
Jump to