​
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-hpm9-h769-jfrh

Published

Last updated

https://images.chainguard.dev/security/CGA-hpm9-h769-jfrh
Package

gitness

Latest Update
Fixed
Fixed Version

3.0.0_beta5-r0

Aliases
  • CVE-2020-26160
  • GHSA-w73w-5m7g-f7qc

Severity

7.5

High

CVSS V3

Summary

Authorization bypass in github.com/dgrijalva/jwt-go

Description

jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images