In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2018-05-29T20:00:00Z
Updated: 2024-09-16T23:05:54.010Z
Reserved: 2017-10-29T00:00:00
Link: CVE-2015-9235
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-05-29T20:29:00.330
Modified: 2024-11-21T02:40:07.100
Link: CVE-2015-9235
Redhat