The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.
Metrics
Affected Vendors & Products
References
History
Thu, 08 May 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Json-jwt Project
Json-jwt Project json-jwt |
|
| CPEs | cpe:2.3:a:json-jwt_project:json-jwt:1.16.3:*:*:*:*:ruby:*:* | |
| Vendors & Products |
Json-jwt Project
Json-jwt Project json-jwt |
Mon, 26 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2023-12-25T00:00:00
Updated: 2024-08-26T20:08:16.108Z
Reserved: 2023-12-25T00:00:00
Link: CVE-2023-51774
Updated: 2024-08-02T22:48:11.253Z
Status : Analyzed
Published: 2024-02-29T01:42:05.597
Modified: 2025-05-08T22:48:00.990
Link: CVE-2023-51774