-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jwt-go Access Restriction Bypass Vuln #1647
Comments
For reference this is tracked in dgrijalva/jwt-go#422. |
Consider using https://github.com/form3tech-oss/jwt-go |
Discussion continues in the related PR #1663 |
Looks like the maintainer of |
See https://github.com/dgrijalva/jwt-go README.md re the move to https://github.com/golang-jwt/jwt. Also see https://github.com/golang-jwt/jwt/releases/tag/v3.2.1 for a fix to the CVE. This version is API compatible with 3.2.0 unlike v4.preview1. |
Please see #1916 (comment) |
done in #1946 |
Issue Description
For echo's JWT middleware, the version of
jwt-go
being used is vulnerable to an Access Restriction Bypass. I'm not sure if the vulnerable affects echo, it appears it may not, with the way the lib is currently used. The library appears to be unmaintained and so longer-term, it should be considered moving to an alternative or using a patched version of the library in case implementation changes.See: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
Checklist
The text was updated successfully, but these errors were encountered: