CVE-2015-9235
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2015-9235. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
Affected Packages
CVSS Scoring
CVSS Score
References
Advisory provided by GitHub Security Advisory Database. Published: October 9, 2018, Modified: August 31, 2020