• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Critical Security Flaw Found in “jsonwebtoken” Library Used by 22,000+ Projects

You are here: Home / General Cyber Security News / Critical Security Flaw Found in “jsonwebtoken” Library Used by 22,000+ Projects
January 10, 2023

high-severity security flaw

A substantial-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that, if correctly exploited, could lead to distant code execution on a concentrate on server.

“By exploiting this vulnerability, attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted JSON web token (JWT) request,” Palo Alto Networks Unit 42 researcher Artur Oleyarsh reported in a Monday report.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Tracked as CVE-2022-23529 (CVSS score: 7.6), the issue impacts all versions of the library, like and beneath 8.5.1, and has been addressed in edition 9.. transported on December 21, 2022. The flaw was reported by the cybersecurity organization on July 13, 2022.

jsonwebtoken, which is produced and preserved by Okta’s Auth0, is a JavaScript module that enables people to decode, confirm, and generate JSON web tokens as a indicates of securely transmitting info in between two parties for authorization and authentication. It has in excess of 10 million weekly downloads on the npm software package registry and is made use of by around 22,000 assignments.

Hence, the skill to operate malicious code on a server could break confidentiality and integrity assures, probably enabling a poor actor to overwrite arbitrary documents on the host and perform any motion of their deciding upon working with a poisoned magic formula critical.

high-severity security flaw

“With that becoming said, in order to exploit the vulnerability explained in this write-up and command the secretOrPublicKey benefit, an attacker will need to have to exploit a flaw within just the top secret administration system,” Oleyarsh spelled out.

As open up supply software more and more emerges as a worthwhile original accessibility pathway for risk actors to phase provide chain attacks, it is essential that vulnerabilities in these types of instruments are proactively determined, mitigated, and patched by downstream consumers.

Producing matters worse is the reality that cybercriminals have turn out to be significantly more quickly at exploiting recently exposed flaws, considerably shrinking the time concerning a patch release and exploit availability. In accordance to Microsoft, it only will take 14 days on ordinary for an exploit to be detected in the wild right after public disclosure of a bug.

To battle this challenge of vulnerability discovery, Google, last thirty day period, introduced the release of OSV-Scanner, an open supply utility that aims to discover all transitive dependencies of a challenge and emphasize applicable shortcomings impacting it.

Located this article appealing? Adhere to us on Twitter  and LinkedIn to study more distinctive content material we publish.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Freejacking Campaign By PurpleUrchin Bypasses Captchas

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical Security Flaw Found in “jsonwebtoken” Library Used by 22,000+ Projects
  • Freejacking Campaign By PurpleUrchin Bypasses Captchas
  • ChatGPT Used to Develop New Malicious Tools
  • Dark Web Actors Fight For Drug Trafficking and Illegal Pharmacy Supremacy
  • Kinsing Cryptojacking Hits Kubernetes Clusters via Misconfigured PostgreSQL
  • New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks
  • UK insurer announces ‘world-first’ cyber catastrophe bond
  • Why Do User Permissions Matter for SaaS Security?
  • FCC plans strict overhaul of 15-year-old US data breach regulations
  • Security updates for Windows 7 finally end, users urged to upgrade

Copyright © TheCyberSecurity.News, All Rights Reserved.