{ "schema_version": "1.4.0", "id": "GHSA-9gxv-x7rp-r2hc", "modified": "2024-05-15T21:47:39Z", "published": "2024-05-15T21:47:39Z", "aliases": [], "summary": "gree/jose - \"None\" Algorithm treated as valid in tokens", "details": "Several widely-used JSON Web Token (JWT) libraries, including node-jsonwebtoken, pyjwt, namshi/jose, php-jwt, and jsjwt, are affected by critical vulnerabilities that could allow attackers to bypass the verification step when using asymmetric keys (RS256, RS384, RS512, ES256, ES384, ES512).", "severity": [], "affected": [ { "package": { "ecosystem": "Packagist", "name": "gree/jose" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "2.2.0" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries" }, { "type": "WEB", "url": "https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries" }, { "type": "WEB", "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/gree/jose/2016-08-30.yaml" }, { "type": "PACKAGE", "url": "https://github.com/nov/jose-php" } ], "database_specific": { "cwe_ids": [], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2024-05-15T21:47:39Z", "nvd_published_at": null } }