GHSA-4rr6-gf59-ggw5: namshi/jose - Verification bypass
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
5/17/2024
Updated
5/17/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| namshi/jose | composer | < 2.2.0 | 2.2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper algorithm validation during JWT verification. The library's JWS::verify method likely relied on the 'alg' header from the untrusted token payload to determine the verification method, rather than enforcing the expected algorithm. This allowed attackers to forge tokens by specifying HMAC algorithms (like HS256) and using the public RSA/ECDSA key as an HMAC secret. The high confidence comes from the documented vulnerability pattern in JWT libraries and the patched version (2.2.0) indicating a fix in verification logic.