Vulnerability Details CVE-2015-9235
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.347
EPSS Ranking 96.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2015-9235
-
cpe:2.3:a:auth0:jsonwebtoken:0.1.0
-
cpe:2.3:a:auth0:jsonwebtoken:0.2.0
-
cpe:2.3:a:auth0:jsonwebtoken:0.3.0
-
cpe:2.3:a:auth0:jsonwebtoken:0.4.0
-
cpe:2.3:a:auth0:jsonwebtoken:0.4.1
-
cpe:2.3:a:auth0:jsonwebtoken:1.0.0
-
cpe:2.3:a:auth0:jsonwebtoken:1.0.2
-
cpe:2.3:a:auth0:jsonwebtoken:1.1.0
-
cpe:2.3:a:auth0:jsonwebtoken:1.1.1
-
cpe:2.3:a:auth0:jsonwebtoken:1.1.2
-
cpe:2.3:a:auth0:jsonwebtoken:1.2.0
-
cpe:2.3:a:auth0:jsonwebtoken:1.3.0
-
cpe:2.3:a:auth0:jsonwebtoken:2.0.0
-
cpe:2.3:a:auth0:jsonwebtoken:3.0.0
-
cpe:2.3:a:auth0:jsonwebtoken:3.1.0
-
cpe:2.3:a:auth0:jsonwebtoken:3.1.1
-
cpe:2.3:a:auth0:jsonwebtoken:3.2.0
-
cpe:2.3:a:auth0:jsonwebtoken:3.2.1
-
cpe:2.3:a:auth0:jsonwebtoken:3.2.2
-
cpe:2.3:a:auth0:jsonwebtoken:4.0.0
-
cpe:2.3:a:auth0:jsonwebtoken:4.1.0
-
cpe:2.3:a:auth0:jsonwebtoken:4.2.0
-
cpe:2.3:a:auth0:jsonwebtoken:4.2.1