Vulnerability CVE-2018-0114


Published: 2018-01-04

Description:
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Cisco node-jos Resign Tokens Proof Of Concept
Andrea Cappa
23.03.2018
Med.
Cisco node-jos < 0.11.0 Re-sign Tokens
zioBlack
28.03.2018

Type:

CWE-320

(Key Management Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

 References:
http://www.securityfocus.com/bid/102445
https://github.com/cisco/node-jose/blob/master/CHANGELOG.md
https://github.com/zi0Black/POC-CVE-2018-0114
https://tools.cisco.com/security/center/viewAlert.x?alertId=56326
https://www.exploit-db.com/exploits/44324/

Copyright 2024, cxsecurity.com

 

Back to Top