CVE-2020-26160
30.09.2020, 18:15
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.Enginsight
Vendor | Product | Version |
---|---|---|
jwt-go_project | jwt-go | 𝑥 ≤ 3.2.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
golang-github-coreos-discovery-etcd-io |
| ||||||||||||||||||||||||
golang-github-dgrijalva-jwt-go |
| ||||||||||||||||||||||||
juju-core |
| ||||||||||||||||||||||||
telegraf |
|
Common Weakness Enumeration