๐Ÿ” CVE Alert

CVE-2024-31033

MEDIUM 6.8
CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th

JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class. NOTE: the vendor disputes this because the "ignores" behavior cannot occur (in any version) unless there is a user error in how JJWT is used, and because the version that was actually tested must have been more than six years out of date.

Vendor n/a
Product n/a
Published Apr 1, 2024
Last Updated Aug 27, 2024
Stay Ahead of the Next One

Get instant alerts for n/a n/a

Be the first to know when new medium vulnerabilities affecting n/a n/a are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n/a / n/a
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/jwtk/jjwt viralpatel.net: https://www.viralpatel.net/java-create-validate-jwt-token/ github.com: https://github.com/2308652512/JJWT_BUG github.com: https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358