jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515 | Third Party Advisory |
https://github.com/dgrijalva/jwt-go/pull/426 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-09-30 11:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-26160
Mitre link : CVE-2020-26160
JSON object : View
Products Affected
jwt-go_project
- jwt-go