Name | CVE-2020-26160 |
Description | jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 971556 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
golang-github-dgrijalva-jwt-go (PTS) | buster | 3.0.0.1+REALLY.2.6.0-3 | fixed |
bullseye | 3.2.0-3 | fixed | |
bookworm, sid | 3.2.0-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
golang-github-dgrijalva-jwt-go | source | stretch | (not affected) | |||
golang-github-dgrijalva-jwt-go | source | buster | (not affected) | |||
golang-github-dgrijalva-jwt-go | source | (unstable) | 3.2.0-3 | 971556 |
[buster] - golang-github-dgrijalva-jwt-go <not-affected> (vulnerable code not present until version 3.0.0)
[stretch] - golang-github-dgrijalva-jwt-go <not-affected> (vulnerable code not present until version 3.0.0)
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515
https://github.com/dgrijalva/jwt-go/issues/422
https://github.com/dgrijalva/jwt-go/pull/286