Bug 2155978 (CVE-2022-23539) - CVE-2022-23539 jsonwebtoken: Unrestricted key type could lead to legacy keys usagen
Summary: CVE-2022-23539 jsonwebtoken: Unrestricted key type could lead to legacy keys ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-23539
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2156712 2156713
Blocks: 2155983
TreeView+ depends on / blocked
 
Reported: 2022-12-23 08:24 UTC by Avinash Hanwate
Modified: 2023-05-23 14:42 UTC (History)
5 users (show)

Fixed In Version: jsonwebtoken 9.0.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the jsonwebtoken package. The affected versions of the `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm.
Clone Of:
Environment:
Last Closed: 2023-05-23 14:42:19 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:3265 0 None None None 2023-05-23 09:17:27 UTC

Description Avinash Hanwate 2022-12-23 08:24:08 UTC
Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.

https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3

Comment 7 errata-xmlrpc 2023-05-23 09:17:25 UTC
This issue has been addressed in the following products:

  RHODF-4.12-RHEL-8

Via RHSA-2023:3265 https://access.redhat.com/errata/RHSA-2023:3265

Comment 8 Product Security DevOps Team 2023-05-23 14:42:16 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-23539


Note You need to log in before you can comment on or make changes to this bug.