First published: Thu Apr 11 2019(Updated: )
Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Auth0 Auth0-WCF-Service-JWT | <1.0.4 | |
<1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7644 is classified as a medium severity vulnerability due to the risk of unauthorized access via forged JWT tokens.
To fix CVE-2019-7644, upgrade Auth0-WCF-Service-JWT to version 1.0.4 or later.
CVE-2019-7644 exploits the improper error handling that reveals the expected JWT signature, allowing attackers to forge JWT tokens.
CVE-2019-7644 affects all versions of Auth0-WCF-Service-JWT prior to 1.0.4.
Users of the Auth0-WCF-Service-JWT library version before 1.0.4 are impacted by CVE-2019-7644.