Skip to content

Commit 6ef16b0

Browse files
1 parent 6232c29 commit 6ef16b0

2 files changed

Lines changed: 43 additions & 9 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-88q6-jcjg-hvmw/GHSA-88q6-jcjg-hvmw.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-88q6-jcjg-hvmw",
4-
"modified": "2026-01-09T19:39:30Z",
4+
"modified": "2026-03-25T20:10:46Z",
55
"published": "2026-01-09T19:39:30Z",
66
"aliases": [],
77
"summary": "jose-swift has JWT Signature Verification Bypass via None Algorithm",
88
"details": "### Summary\nAn authentication bypass vulnerability allows any unauthenticated attacker to forge arbitrary JWT tokens by setting \"alg\": \"none\" in the token header. The library's verification functions immediately return `true` for such tokens without performing any cryptographic verification, enabling complete impersonation of any user and privilege escalation.\n\n### Details\n The vulnerability exists in Sources/JSONWebSignature/JWS+Verify.swift at lines 34-37:\n\n```\n public func verify<Key>(key: Key?) throws -> Bool {\n guard SigningAlgorithm.none != protectedHeader.algorithm else {\n return true // <-- Vulnerability: returns true without verification\n }\n```\n When the JWT header contains \"alg\": \"none\", the verify() method returns true immediately without:\n 1. Checking if the signature is empty or present\n 2. Validating the token against any key\n 3. Requiring explicit opt-in from the caller\n \n\n The SigningAlgorithm enum in Sources/JSONWebAlgorithms/Signatures/SigningAlgorithm.swift:72 explicitly includes case none = \"none\" as a valid algorithm.\n\n All verification methods are affected:\n - JWS.verify(key:) - Instance method\n - JWS.verify(jwsString:payload:key:) - Static method\n - JWT.verify(jwtString:senderKey:) - High-level API\n\n### PoC\n\n 1. Create a forged JWT with modified claims:\n // Forged header with alg:none\n let header = #\"{\"alg\":\"none\",\"typ\":\"JWT\"}\"#\n\n // Attacker's payload with escalated privileges\n let payload = #\"{\"sub\":\"user123\",\"admin\":true}\"#\n\n // Base64URL encode and concatenate with empty signature\n let forgedToken = base64url(header) + \".\" + base64url(payload) + \".\"\n // Result: eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJzdWIiOiJ1c2VyMTIzIiwiYWRtaW4iOnRydWV9.\n\n 2. Verify the forged token passes verification:\n let jws = try JWS(jwsString: forgedToken)\n let isValid = try jws.verify(key: legitimateSecretKey) // Returns TRUE\n\n\n### Impact\n\n This is an authentication bypass vulnerability. Who is impacted: Any application using jose-swift for JWT verification is vulnerable. An attacker can:\n\n - Forge identity: Create tokens claiming to be any user\n - Escalate privileges: Add admin/superuser claims to gain unauthorized access\n - Bypass authentication entirely: Access protected resources without valid credentials\n - Modify any claim: Change expiration, audience, issuer, or any custom claims\n\n The attack requires no knowledge of the signing key and works against all signature algorithms (HS256, RS256, ES256, etc.) since the attacker simply bypasses signature verification entirely.\n\n### Credits\nReported by Louis Nyffenegger - https://pentesterlab.com/",
99
"severity": [
1010
{
1111
"type": "CVSS_V4",
12-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P"
1313
}
1414
],
1515
"affected": [
@@ -41,16 +41,28 @@
4141
"type": "WEB",
4242
"url": "https://github.com/beatt83/jose-swift/security/advisories/GHSA-88q6-jcjg-hvmw"
4343
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/beatt83/jose-swift/pull/62"
47+
},
48+
{
49+
"type": "WEB",
50+
"url": "https://github.com/beatt83/jose-swift/commit/13e5ae6f23ef1487b0dad72540eff414272bd7ca"
51+
},
4452
{
4553
"type": "PACKAGE",
4654
"url": "https://github.com/beatt83/jose-swift"
55+
},
56+
{
57+
"type": "WEB",
58+
"url": "https://github.com/beatt83/jose-swift/releases/tag/6.0.2"
4759
}
4860
],
4961
"database_specific": {
5062
"cwe_ids": [
5163
"CWE-327"
5264
],
53-
"severity": "CRITICAL",
65+
"severity": "HIGH",
5466
"github_reviewed": true,
5567
"github_reviewed_at": "2026-01-09T19:39:30Z",
5668
"nvd_published_at": null

advisories/unreviewed/2026/03/GHSA-hj7x-hmf2-hc2p/GHSA-hj7x-hmf2-hc2p.json renamed to advisories/github-reviewed/2026/03/GHSA-hj7x-hmf2-hc2p/GHSA-hj7x-hmf2-hc2p.json

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hj7x-hmf2-hc2p",
4-
"modified": "2026-03-24T18:31:27Z",
4+
"modified": "2026-03-25T20:10:56Z",
55
"published": "2026-03-23T15:30:44Z",
66
"aliases": [
77
"CVE-2026-4404"
88
],
9+
"summary": "Harbor allows the use of the default password for web UI login",
910
"details": "Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/goharbor/harbor"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.15.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -28,8 +49,8 @@
2849
"url": "https://github.com/goharbor/harbor/pull/22751"
2950
},
3051
{
31-
"type": "WEB",
32-
"url": "https://cwe.mitre.org/data/definitions/1393.html"
52+
"type": "PACKAGE",
53+
"url": "https://github.com/goharbor/harbor"
3354
},
3455
{
3556
"type": "WEB",
@@ -42,11 +63,12 @@
4263
],
4364
"database_specific": {
4465
"cwe_ids": [
66+
"CWE-1393",
4567
"CWE-798"
4668
],
4769
"severity": "CRITICAL",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
70+
"github_reviewed": true,
71+
"github_reviewed_at": "2026-03-25T20:10:56Z",
5072
"nvd_published_at": "2026-03-23T15:16:35Z"
5173
}
5274
}

0 commit comments

Comments
 (0)