In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11424
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11424
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
572 | CVE-2015-5224 | 관리자 | 2017.08.27 | 69 |
571 | CVE-2017-0135 | 관리자 | 2017.03.18 | 70 |
570 | CVE-2017-13131 (imagemagick) | 관리자 | 2017.08.27 | 70 |
569 | CVE-2017-12971 (apache2triad) | 관리자 | 2017.08.27 | 71 |
568 | CVE-2017-12787 | 관리자 | 2017.08.27 | 78 |
567 | CVE-2017-13133 (imagemagick) | 관리자 | 2017.08.27 | 80 |
566 | CVE-2017-0126 | 관리자 | 2017.03.18 | 83 |
565 | CVE-2017-13139 (imagemagick) | 관리자 | 2017.08.27 | 85 |
564 | CVE-2015-8352 | 관리자 | 2017.08.27 | 85 |
563 | CVE-2017-0092 | 관리자 | 2017.03.18 | 87 |
562 | CVE-2014-6189 (security_network_protection_3100_firmware, security_network_protection_4100_firmware, security_network_protection_5100_firmware, security_network_protection_7100_firmware) | 관리자 | 2017.08.27 | 87 |
561 | CVE-2016-3203 | 관리자 | 2016.06.17 | 88 |
560 | CVE-2017-0150 | 관리자 | 2017.03.18 | 88 |
559 | CVE-2017-13146 (imagemagick) | 관리자 | 2017.08.27 | 88 |
558 | CVE-2017-0052 | 관리자 | 2017.03.18 | 89 |