CVE-2020-26160

SOURCE - github

Summary

jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1

EPSS Score: 0.00193 (0.567)

Common Weakness Enumeration (CWE)

SOURCE - nist

Improper Authentication

Improper Handling of Exceptional Conditions

SOURCE - github

Improper Authentication

Improper Handling of Exceptional Conditions

SOURCE - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Improper Authentication

Improper Handling of Exceptional Conditions

Missing Authorization

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

SOURCE - redhat

Improper Access Control


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in