aegilops :github::microsoft: · @aegilops
85 followers · 296 posts · Server fosstodon.org

That :javascript: JWT "vulnerability"?

Nope 🙅

Exploiting this requires a deserialization bug in an app using the library, or for an attacker to be able to control the code directly (at which point they have RCE already).

Not CVSS 7.6, by any means: it requires an app to be dangerously deserializing untrusted input into a field for security token validation! Most apps hardcode a string.

This is CVSS 0.

This bug is not a vulnerability.

#jwt #cve_2022_23529 #cve #javascript #paloaltounit42

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online