Description
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.
Published: 2018-01-04
Score: 7.5 High
EPSS: 84.7% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jfxm-w8g2-4rcv Cisco node-jose improper validation of JWT signature
History

Mon, 02 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-12-02T20:58:29.226Z

Reserved: 2017-11-27T00:00:00.000Z

Link: CVE-2018-0114

cve-icon Vulnrichment

Updated: 2024-08-05T03:14:16.809Z

cve-icon NVD

Status : Modified

Published: 2018-01-04T06:29:00.417

Modified: 2024-11-21T03:37:32.987

Link: CVE-2018-0114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses