CVE-2020-26160
30.09.2020, 18:15
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.Enginsight| Vendor | Product | Version |
|---|---|---|
| jwt-go_project | jwt-go | 𝑥 ≤ 3.2.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| golang-github-coreos-discovery-etcd-io |
| ||||||||||||||||||||||||
| golang-github-dgrijalva-jwt-go |
| ||||||||||||||||||||||||
| juju-core |
| ||||||||||||||||||||||||
| telegraf |
|
Common Weakness Enumeration