sekurak News · @sekurakbot
30 followers · 232 posts · Server mastodon.com.pl

Jak czasem można ominąć zabezpieczenie oferowane przez JWT? Metoda, którą może zastosować nawet 10-latek :-)

Ekipa z GitHub Security Lab postanowiła ostatnio przeaudytować projekt Datahub. Wśród licznych znalezisk mamy również takie: Missing JWT signature check (CVE-2022-39366) CVSS: 9.9 Obeznani z tematyką JWT już wiedzą co się tutaj święci. No więc tak… we wspomnianym systemie można było w payloadzie tokenu JWT umieścić absolutnie wszystko, a podpis takiego...


sekurak.pl/jak-czasem-mozna-om

#wbiegu #jsonwebtoken #jwt #websec

Last updated 2 years ago

aegilops :github::microsoft: · @aegilops
102 followers · 330 posts · Server fosstodon.org

Ding, dong, the CVE is dead! :partyparrot:

The JWT nodejs "vulnerability" from December, popularised at the start of January, has been recognised as a non-issue 🫥

I'm really glad to see it gone. Hoping we get a rash of news stories to follow up on the torrent 🌊 that followed the Unit 42 blog...

I'm not sure if its removal was down to me raising an issue on the GitHub Advisory Database :omya_github: to ask for it to be removed.

#jwt #cve #errata #cve_2022_23529 #auth0 #unit42 #jsonwebtoken

Last updated 2 years ago

Stephan · @backlogmann
2 followers · 43 posts · Server mastodon.social

In the recent weeks developer ecosystem parts seem be be the weak spot no 1.

And a lot of the events are "published" behind flags to SEO-optimize the Public Relations. "We take security seriously... until it's serious". That's bad practice, and it helps no one. Be transparent about the issues.

* got backdoored (apparently it was a test / dependency confusion attack)
pytorch.org/blog/compromised-n

* - automation holds secrets, compromised via a dev workstation. Customers have to change keys etc.
circleci.com/blog/jan-4-2023-i

* "breach" - they lost their code. Who knows what hardcoded secrets etc. they lost as well.
slack.com/intl/en-au/blog/news

* - part of many JavaScript based stacks. An Authentication Bypass here is a total failure.
security.snyk.io/package/npm/j

* changes the gpg key due to the CircleCI issue. Which is proactive, and well thought of.
docs.datadoghq.com/agent/faq/c

* audited and they found severe vulns. This also affects CI systems, like or Actions in some cases (if the Runner uses Git to build things).
x41-dsec.de/security/research/

What we learn: holistic and Product Security has to look into these "mystical things" like the developer infrastructure, Software Bill Of Materials ( ), Continuous Integration etc. Things 99% of InfoSec professionals have 0 clue about.
In 2023 you should change that, and focus your training efforts there.

#infosec #noindex #pytorch #circleci #slack #jsonwebtoken #oauth #datadog #rpm #x41 #git #jenkins #github #appsec #SBOM

Last updated 2 years ago

Online la seconda puntata del 2023 di !

Si parla degli impatti di e della sua vulnerabilità, poi di che stanno agitando le loro campagne malevole anche in Italia ⤵️

buttondown.email/ninasec/archi

#NINAsec #jsonwebtoken #infostealers

Last updated 2 years ago

https://purl.org/rzr# · @rzr
273 followers · 1668 posts · Server mastodon.social
Yellow Flag · @WPalant
1449 followers · 3191 posts · Server infosec.exchange

I see reports about a vulnerability (CVE-2022-23529), claiming that RCE is possible. Maybe I’m the one missing something here, but how could this possibly be exploited? Is that even a valid vulnerability report?

In order to exploit the vulnerability, someone needs to define a malicious toString function on the key object. Well, if they can do that – why do they need the library to call the function, can’t they do it themselves? They need to run JavaScript code on the server in order to create that function, meaning that the prerequisite for RCE is… 🥁​ RCE!

There seems to be the assumption here that this key object can somehow be serialized along with the function, and then the library will deserialize it from some manipulated storage. But JSON doesn’t serialize function code, and neither does any other serialization format that JavaScript code might use.

Seriously, how is that going around in the news without anybody asking: is there a single realistic scenario where this CVSS score 7.6 (as assigned by the reporter) vulnerability could be abused?

#jsonwebtoken

Last updated 2 years ago

The so-called "vulnerability" (CVE-2022-23529) in is just a marketing stunt. github.com/github/advisory-dat

#jwt #jsonwebtoken

Last updated 2 years ago

· @zd
51 followers · 1638 posts · Server toot.community
ITSEC News · @itsecbot
1122 followers · 33161 posts · Server schleuss.online

Popular JWT cloud security library patches “remote” code execution hole - It's remotely triggerable, but attackers would already have pretty deep network access if... nakedsecurity.sophos.com/2023/

#rce #jwt #jsonwebtoken #cryptography

Last updated 2 years ago

heise online · @heiseonline
39713 followers · 1517 posts · Server mastodon.social

Schadcode-Lücke in JsonWebToken-Bibliothek bedroht 22.000 Software-Projekte

Aufgrund einer Sicherheitslücke in einer weitverbreiteten Bibliothek sind Open-Source-Projekte von unter anderem IBM und Microsoft verwundbar.

heise.de/news/Schadcode-Luecke

#jsonwebtoken #patch #security #sicherheitslucken #softwarebiblioheken #supplychainattack #update

Last updated 2 years ago

A high-severity security flaw has been disclosed in the jsonwebtoken (JWT) library that, if successfully exploited, could lead to remote code execution () on a target server.

is developed and maintained by 's Auth0.

thehackernews.com/2023/01/crit

#opensource #rce #jsonwebtoken #okta #cybersecurity #infosec

Last updated 2 years ago

securityaffairs · @securityaffairs
300 followers · 192 posts · Server infosec.exchange

High Severity Security Found in "jsonwebtoken" Library (CVE-2022-23529). Attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted request. Update jsonwebtoken package to v9.0.0: thehackernews.com/2023/01/crit

#jsonwebtoken #vulnerability #npm #jwt

Last updated 2 years ago

The whale · @thewhalecc
284 followers · 1736 posts · Server framapiaf.org

JSON Web Token (JSON Web Encryption) Authentication with Kirby CMS 3 - In yet another recent project, I’m building a book proposal submission... blog.mhgbrown.is/posts/8b72bbd by @mhgbrown@twitter.com

#dev #kirby3 #authentification #jsonwebtoken

Last updated 5 years ago