GHSA-R2VW-JGQ9-JQX2
Vulnerability from github – Published: 2020-09-03 15:54 – Updated: 2020-08-31 19:02
VLAI?
Summary
Improper Authorization in @sap-cloud-sdk/core
Details
Affected versions of @sap-cloud-sdk/core do not properly validate JWTs. The verifyJwt() function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.
Recommendation
Upgrade to version 1.21.2 or later.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "@sap-cloud-sdk/core"
},
"ranges": [
{
"events": [
{
"introduced": "1.19.0"
},
{
"fixed": "1.21.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-285"
],
"github_reviewed": true,
"github_reviewed_at": "2020-08-31T19:02:48Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.\n\n\n## Recommendation\n\nUpgrade to version 1.21.2 or later.",
"id": "GHSA-r2vw-jgq9-jqx2",
"modified": "2020-08-31T19:02:48Z",
"published": "2020-09-03T15:54:11Z",
"references": [
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/1540"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Improper Authorization in @sap-cloud-sdk/core"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…