GHSA-c8v6-786g-vjx6

Suggest an improvement
Source
https://github.com/advisories/GHSA-c8v6-786g-vjx6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-c8v6-786g-vjx6/GHSA-c8v6-786g-vjx6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-c8v6-786g-vjx6
Aliases
  • CVE-2023-51774
Related
Published
2024-02-29T03:33:14Z
Modified
2024-12-04T05:37:14.261717Z
Summary
json-jwt allows bypass of identity checks via a sign/encryption confusion attack
Details

The json-jwt (aka JSON::JWT) gem 1.16.x before 1.16.6, 1.15.x before 1.15.3.1 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.

Database specific
{
    "nvd_published_at": "2024-02-29T01:42:05Z",
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-03-01T16:56:21Z"
}
References

Affected packages

RubyGems / json-jwt

Package

Name
json-jwt
Purl
pkg:gem/json-jwt

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.16.0
Fixed
1.16.6

Affected versions

1.*

1.16.0
1.16.1
1.16.2
1.16.3
1.16.4
1.16.5

RubyGems / json-jwt

Package

Name
json-jwt
Purl
pkg:gem/json-jwt

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.3.1

Affected versions

0.*

0.0.0
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.2.0
0.3.0
0.3.1
0.3.2
0.3.3
0.4.0
0.4.1
0.4.2
0.4.3
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5
0.5.6
0.6.0
0.6.1
0.7.0.alpha
0.7.0.alpha2
0.7.0
0.7.1
0.8.0
0.8.1

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.1.0
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.3.0
1.3.1
1.4.0
1.5.0
1.5.1
1.5.2
1.6.0
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5
1.7.0
1.7.1
1.7.2
1.8.0
1.8.1.pre
1.8.1
1.8.2
1.8.3
1.9.0
1.9.1
1.9.2
1.9.3
1.9.4
1.10.0
1.10.1
1.10.2
1.11.0
1.12.0
1.13.0
1.14.0
1.15.0
1.15.1
1.15.2
1.15.3