← Back to CVEs
CVE-2020-26160
HIGH7.5
Description
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/30/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
jwt-go_project:jwt-go
Weaknesses (CWE)
CWE-287CWE-755
References
https://github.com/dgrijalva/jwt-go/pull/426(cve@mitre.org)
https://github.com/dgrijalva/jwt-go/pull/426(af854a3a-2127-422b-91ae-364da2661108)
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.