-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update jwt-go to v4 to address CVE-2020-26160 #69
Conversation
683256c
to
20bd023
Compare
20bd023
to
2e839a6
Compare
Thanks @andresperezl! Since this package is used in production for many folks I'd like to hold off on this until the new version of |
@grounded042 it seems that the project has not been active for at least 9 month now, have read in other issues and projects that are moving to other libraries. |
Gotcha. Thanks for the info @andresperezl. What libraries are the other projects moving to? |
My team is doing some internal testing with |
We at Fiber are using form3tech's fork - https://github.com/form3tech-oss/jwt-go. A security focused middleware like this should not be using an unmaintained and insecure JWT library. Please look into this @mgonto @asheshv @lxfontes |
I'd just like to +1 this, others are moving to the form3tech fork, dgrijalva's appears to be unmaintained. The planned v4 version is over 2 years old at this point, it's probably not coming soon. |
Thanks for the input all - we had an internal discussion about this and will be moving it along. Sorry for that wait! |
For the short term we will be going with https://github.com/form3tech-oss/jwt-go as we need to fix this security vulnerability. However, this is a breaking change due to the claims audience going from a string to a slice of strings. Since we have not versioned this package up to this point we will release this as v1.0.0. We are not confident that the form3tech-oss/jwt-go library will be consistently updated and maintained (they haven't even updated the README), so we will immediately begin work on the next version of this package which will most likely use https://github.com/lestrrat-go/jwx. I'll shortly be pushing a change up in this PR and will have someone from my team review this so we can get it merged and released. |
Signed-off-by: Jon Carl <jon.carl@auth0.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
LGTM! Thanks for taking such a detailed look here and coming up with a plan going forward. For long term maintenance of things like this, I stumbled on the https://github.com/gofrs organization which seems like it was created for exactly this type of situation, but unfortunately that doesn't seem very active either... |
Earlier today, the dependency `github.com/dgrijalva/jwt-go` dependency was updated to `github.com/dgrijalva/jwt-go/v4`. The docs without this change result in difficult to diagnose type issues, since the types don't mesh up. Here is the relevant PR that was merged and release for the Go SDK: auth0/go-jwt-middleware#69
This reverts commit 1c6db3c.
Hi there. thanks for your efforts. Has this been released with v1.0.0? This still appears to be using |
Sorry, I think I read this incorrectly
with which you probably refer to using the form3tech package in that release. |
Seems that |
Hey @dschreij and @ezk84 at this point we do not have plans to use v4 of |
Thanks for the heads up. I actually saw that issue too, but it slipped my mind I guess. I know the chi router dev team also wanted to move away from dgrijalva/jwt-go at one point and chose https://github.com/lestrrat-go/jwx in the end. Maybe worth looking into. |
By submitting a PR to this repository, you agree to the terms within the Auth0 Code of Conduct. Please see the contributing guidelines for how to create and submit a high-quality PR for this repo.
Description
Update
github.com/dgrijalva/jwt-go
dependency togithub.com/dgrijalva/jwt-go/v4
to address CVE-2020-26160References
Testing
Checklist
master