Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add fix for CVE-2022-3102 #299

Merged
merged 2 commits into from
Sep 13, 2022
Merged

Add fix for CVE-2022-3102 #299

merged 2 commits into from
Sep 13, 2022

Conversation

simo5
Copy link
Member

@simo5 simo5 commented Sep 13, 2022

Note this fix technically breaks the current JWT api.
unfortunately there was no way to address this weakness without a change in semantics.

This means some applications may throw exceptions in some cases that were previously handled.

A knob to alter this behavior has been provided for applications that can't immediately refactor but still wants a way to upgrade t later jwcrypto releases.

This is needed to address CVE-2022-3102.
Thanks to Tom tervoort from Secura for finding and reporting this issue.

Also test that "unepxected" token types are not validated

Signed-off-by: Simo Sorce <simo@redhat.com>
Because the previous patch changes the behavoir of jwcrypto, this knob
is a quick way for application developers to get back the old behavior
temporarily without having to change the code immediately as it may
require some significant refactoring, depending on how the application
was written.

This is not intended to be used in the long term and will be eventually
deleted. Unfortunately I cannot decorate a simply global variable with
the @deprecated decoration to make it clearer.

Signed-off-by: Simo Sorce <simo@redhat.com>
@simo5 simo5 merged commit 34b6525 into latchset:master Sep 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant