OpenTok-PHP-SDK icon indicating copy to clipboard operation
OpenTok-PHP-SDK copied to clipboard

firebase/php-jwt-v5.5.1: 1 vulnerabilities (highest severity is: 9.1)

Open mend-for-github-com[bot] opened this issue 3 years ago • 0 comments

Vulnerable Library - firebase/php-jwt-v5.5.1

A simple library to encode and decode JSON Web Tokens (JWT) in PHP. Should conform to the current spec.

Library home page: https://api.github.com/repos/firebase/php-jwt/zipball/83b609028194aa042ea33b5af2d41a7427de80e6

Found in HEAD commit: 1493c01d5435adf3cd4c1902d1963d0e40922821

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2021-46743 High 9.1 firebase/php-jwt-v5.5.1 Direct v6.0.0

Details

CVE-2021-46743

Vulnerable Library - firebase/php-jwt-v5.5.1

A simple library to encode and decode JSON Web Tokens (JWT) in PHP. Should conform to the current spec.

Library home page: https://api.github.com/repos/firebase/php-jwt/zipball/83b609028194aa042ea33b5af2d41a7427de80e6

Dependency Hierarchy:

  • :x: firebase/php-jwt-v5.5.1 (Vulnerable Library)

Found in HEAD commit: 1493c01d5435adf3cd4c1902d1963d0e40922821

Found in base branch: main

Vulnerability Details

In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.

Publish Date: 2022-03-29

URL: CVE-2021-46743

CVSS 3 Score Details (9.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46743

Release Date: 2022-03-29

Fix Resolution: v6.0.0