Miggo Logo

CVE-2018-0114:
Cisco node-jose improper validation of JWT signature

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.99232%
Published
5/13/2022
Updated
10/14/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
node-josenpm< 0.11.00.11.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from automatic trust in JWS header-embedded JWK keys during verification. The changelog for 0.11.0 explicitly shows the addition of an 'allowEmbeddedKeys' option to control this behavior, indicating the verification function previously lacked this safeguard. The POC demonstrates header manipulation that would be processed by the verification flow, and CWE-347 confirms it's a signature validation issue. The verification function is the logical point where header JWK processing and signature checking intersect.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility in t** *is*o no**-jos* op*n sour** li*r*ry ***or* *.**.* *oul* *llow *n un*ut**nti**t**, r*mot* *tt**k*r to r*-si*n tok*ns usin* * k*y t**t is *m****** wit*in t** tok*n. T** vuln*r**ility is *u* to no**-jos* *ollowin* t** JSON W** Si*

Reasoning

T** vuln*r**ility st*ms *rom *utom*ti* trust in JWS *****r-*m****** JWK k*ys *urin* v*ri*i**tion. T** ***n**lo* *or *.**.* *xpli*itly s*ows t** ***ition o* *n '*llow*m******K*ys' option to *ontrol t*is ****vior, in*i**tin* t** v*ri*i**tion `*un*tion`