noobaa-core
noobaa-core copied to clipboard
JWT Vulnerability
Environment info
- Version: 1.8
- Deployment: NA
- Customer: NA
Actual behavior
- https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
- JWT allows the adversary to control the choice of algorithm the server uses to verify the token which can be used in various ways explained in this link.
- Our exposure is not critical because we use latest version of the library and we do not using asymmetric keys.
Expected behavior
- We should restrict our validation only to the default algorithm we use (HS256)
Steps to reproduce
- NA
Screenshots or Logs or other output that would be helpful
(If large, please upload as attachment)