CVE-2017-10862

jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token.
References
Link Resource
https://github.com/reallylabs/jwt-scala Third Party Advisory
https://jvn.jp/en/vu/JVNVU90916766/index.html Third Party Advisory VDB Entry
https://github.com/reallylabs/jwt-scala Third Party Advisory
https://jvn.jp/en/vu/JVNVU90916766/index.html Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:really:jwt-scala:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:06

Type Values Removed Values Added
References () https://github.com/reallylabs/jwt-scala - Third Party Advisory () https://github.com/reallylabs/jwt-scala - Third Party Advisory
References () https://jvn.jp/en/vu/JVNVU90916766/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/vu/JVNVU90916766/index.html - Third Party Advisory, VDB Entry

Information

Published : 2017-10-12 14:29

Updated : 2024-11-21 03:06


NVD link : CVE-2017-10862

Mitre link : CVE-2017-10862

CVE.ORG link : CVE-2017-10862


JSON object : View

Products Affected

really

  • jwt-scala
CWE
CWE-345

Insufficient Verification of Data Authenticity