Miggo Logo

GHSA-gcgw-q47m-prvj: Duplicate Advisory: Improper JWT Signature Validation in SAP Security Services Library

9.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
12/12/2023
Updated
9/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.sap.cloud.security:java-securitymaven< 2.17.02.17.0
com.sap.cloud.security:java-securitymaven>= 3.0.0, < 3.3.03.3.0
com.sap.cloud.security.xsuaa:spring-xsuaamaven< 2.17.02.17.0
com.sap.cloud.security.xsuaa:spring-xsuaamaven>= 3.0.0, < 3.3.03.3.0
com.sap.cloud.security:spring-securitymaven< 2.17.02.17.0
com.sap.cloud.security:spring-securitymaven>= 3.0.0, < 3.3.03.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on JWT validation flaws enabling privilege escalation. Key functions were identified by: 1) Core token validation entry points (Token.validate), 2) Spring Security integration points (XsuaaJwtDecoder.decode), and 3) Servlet authentication handlers (XsuaaTokenAuthenticator.authenticate). The high confidence for Token.validate stems from its direct role in signature verification as described in advisories. Other functions are medium confidence based on architectural position and CWE mappings, though exact patch changes aren't visible.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## *upli**t* **visory T*is **visory **s ***n wit**r*wn ****us* it is * *upli**t* o* **S*-****-pxq*-****. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription S*P *TP S**urity S*rvi**s Int**r*tion Li*r*ry ([J*v*] *lou*-s**

Reasoning

T** vuln*r**ility **nt*rs on JWT v*li**tion *l*ws *n**lin* privil*** *s**l*tion. K*y *un*tions w*r* i**nti*i** *y: *) *or* tok*n `v*li**tion` *ntry points (`Tok*n.v*li**t*`), *) Sprin* S**urity int**r*tion points (`Xsu**Jwt***o**r.***o**`), *n* *) S*