You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
mend-for-github-combot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0+incompatible
Oct 2, 2022
mend-for-github-combot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0+incompatible
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-gO-v3.2.0+incompatible
Nov 14, 2022
mend-for-github-combot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-gO-v3.2.0+incompatible
CVE-2020-26160 (High) detected in github.com/dgrijaLva/jwt-go-v3.2.0+incompatible
Nov 20, 2022
mend-for-github-combot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijaLva/jwt-go-v3.2.0+incompatible
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0+incompatible
Dec 23, 2022
mend-for-github-combot
changed the title
CVE-2020-26160 (High) detected in github.com/dgrijalva/jwt-go-v3.2.0+incompatible
CVE-2020-26160 (High) detected in github.com/DGRIJALVA/jwt-go-v3.2.0+incompatible
Jan 7, 2023
CVE-2020-26160 - High Severity Vulnerability
Vulnerable Library - github.com/DGRIJALVA/jwt-go-v3.2.0+incompatible
ARCHIVE - Golang implementation of JSON Web Tokens (JWT). This project is now maintained at:
Library home page: https://proxy.golang.org/github.com/dgrijalva/jwt-go/@v/v3.2.0+incompatible.zip
Dependency Hierarchy:
Found in HEAD commit: ee70ce2ab47136bf09e45e9ec446fb0c4cd889ff
Found in base branch: master
Vulnerability Details
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
Publish Date: 2020-09-30
URL: CVE-2020-26160
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-26160
Release Date: 2020-09-30
Fix Resolution: v4.0.0-preview1
The text was updated successfully, but these errors were encountered: