Miggo Logo

CVE-2019-7644:
Critical severity vulnerability that affects Auth0-WCF-Service-JWT

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.65811%
Published
4/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Auth0-WCF-Service-JWTnuget< 1.0.41.0.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states that failed signature validation leaks the expected signature in error messages. This indicates the signature validation function constructs error messages containing sensitive cryptographic material. The most logical location for this would be in the JWT signature validation method (likely named ValidateSignature) within the JWT validation component (JwtValidator class in a .NET implementation). The high confidence comes from the direct match between described vulnerability behavior and standard JWT validation implementation patterns in .NET/WCF services.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ut** *ut**-W**-S*rvi**-JWT ***or* *.*.* l**ks t** *xp**t** JWT si*n*tur* in *n *rror m*ss*** w**n it **nnot su***ss*ully v*li**t* t** JWT si*n*tur*. I* t*is *rror m*ss*** is pr*s*nt** to *n *tt**k*r, t**y **n *or** *n *r*itr*ry JWT tok*n t**t will *

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t **il** si*n*tur* `v*li**tion` l**ks t** *xp**t** si*n*tur* in *rror m*ss***s. T*is in*i**t*s t** si*n*tur* `v*li**tion` `*un*tion` *onstru*ts *rror m*ss***s *ont*inin* s*nsitiv* *rypto*r*p*i* m*t*r