CVE-2016-10555:
Forgeable Public/Private Tokens in jwt-simple
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9929%
CWE
Published
11/6/2018
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
jwt-simple | npm | < 0.3.1 | 0.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from jwt-simple
's decode
function (lib/jwt.js
) accepting algorithm specifications from untrusted JWT headers. The commit diff shows the patched version added an algorithm parameter to override header values. Pre-0.3.1 versions lacked this enforcement, matching CVE-2016-10555
's description of algorithm choice being client-controlled. This allowed attackers to substitute asymmetric algorithms with symmetric ones using public keys as HMAC secrets.