Vulnerability Details CVE-2018-1000125
inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. This attack appear to be exploitable via an attacker crafting a token with a valid header and body and then requests it to be validated. This vulnerability appears to have been fixed in 1.3.0 and later or after commit 0d94dcef0133d699f21d217e922564adbb83a227.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2018-1000125
-
cpe:2.3:a:inversoft:prime-jwt:0.1.0
-
cpe:2.3:a:inversoft:prime-jwt:0.1.1
-
cpe:2.3:a:inversoft:prime-jwt:0.1.2
-
cpe:2.3:a:inversoft:prime-jwt:0.1.3
-
cpe:2.3:a:inversoft:prime-jwt:0.1.4
-
cpe:2.3:a:inversoft:prime-jwt:0.1.5
-
cpe:2.3:a:inversoft:prime-jwt:0.1.6
-
cpe:2.3:a:inversoft:prime-jwt:0.2.0
-
cpe:2.3:a:inversoft:prime-jwt:0.2.1
-
cpe:2.3:a:inversoft:prime-jwt:1.0.0
-
cpe:2.3:a:inversoft:prime-jwt:1.1.0
-
cpe:2.3:a:inversoft:prime-jwt:1.2.0
-
cpe:2.3:a:inversoft:prime-jwt:1.2.1