CVE-2022-23540

Updated on 22 Dec 2022

Severity

7.6 High severity

Details

CVSS score
7.6
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

Overview

About vulnerability

In versions <=8.5.1 of jsonwebtoken library, lack of algorithm definition in the jwt.verify() function can lead to signature validation bypass due to defaulting to the none algorithm for signature verification. Users are affected if you do not specify algorithms in the jwt.verify() function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the jwt.verify() method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the none algorithm. If you need ’none’ algorithm, you have to explicitly specify that in jwt.verify() options.

Details

Affected product:
Express , jpm , jsonwebtoken , sign-addon
Affected packages:
jsonwebtoken @ 8.5.1 (+10 more)
In versions <=8.5.1 of jsonwebtoken library, lack of algorithm definition in the jwt.verify() function can lead to signature validation bypass due to defaulting to the none algorithm for signature verification. Users are affected if you do not specify algorithms in the jwt.verify() function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the jwt.verify() method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the none algorithm. If you need ’none’ algorithm, you have to explicitly specify that in jwt.verify() options.

Fixes