{ "schema_version": "1.4.0", "id": "GHSA-mj4x-wcxf-hm8x", "modified": "2023-08-25T23:55:12Z", "published": "2018-07-31T18:13:51Z", "aliases": [ "CVE-2018-1000539" ], "summary": "Json-jwt did not verify the cryptographic signature for data", "details": "The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "affected": [ { "package": { "ecosystem": "RubyGems", "name": "json-jwt" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.5.1" }, { "fixed": "1.9.4" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000539" }, { "type": "WEB", "url": "https://github.com/nov/json-jwt/pull/62" }, { "type": "WEB", "url": "https://github.com/nov/json-jwt/commit/a3b2147f0f6d9aca653e7a30e453d3a92b33413f" }, { "type": "PACKAGE", "url": "https://github.com/nov/json-jwt" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json-jwt/CVE-2018-1000539.yml" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4283" } ], "database_specific": { "cwe_ids": [ "CWE-347" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:46:30Z", "nvd_published_at": null } }