Skip to content

Commit 973ee93

Browse files
committed
Update CVE-2023-51774.yml
Mention that versions 1.16.5 and below are vulnerable. The original advisory was published on 2023-12-22, but version 1.16.4 was published on 2023-12-27. The diffs of versions 1.16.4 and 1.16.5 do not appear to contain any significant changes to the logic which would indicate patching.
1 parent b2eb3fe commit 973ee93

1 file changed

Lines changed: 4 additions & 3 deletions

File tree

gems/json-jwt/CVE-2023-51774.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,14 @@ url: https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
66
title: json-jwt allows bypass of identity checks via a sign/encryption confusion attack
77
date: 2024-02-29
88
description: |
9-
The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows
9+
The json-jwt (aka JSON::JWT) gem versions 1.16.5 and below sometimes allows
1010
bypass of identity checks via a sign/encryption confusion attack.
1111
For example, JWE can sometimes be used to bypass JSON::JWT.decode.
12-
notes: Never patched
12+
notes: Not patched yet
1313
related:
1414
url:
1515
- https://nvd.nist.gov/vuln/detail/CVE-2023-51774
1616
- https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
1717
- https://github.com/advisories/GHSA-c8v6-786g-vjx6
18-
# not CVSS number, latest gem version is 1.16.5
18+
# no CVSS score yet. advisory was published before version 1.16.4 was released.
19+
# versions 1.16.4 and 1.16.5 do not seem patched.

0 commit comments

Comments
 (0)