Authorization bypass in github.com/dgrijalva/jwt-go

Overview

Source
ID
GHSA-w73w-5m7g-f7qc
Aliases
CVE-2020-26160
GO-2020-0017

Description

jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1

Summary

35.90k
Total packages affected
Packages with at least one version that is affected by the advisory or has an affected dependency.
2.85k
Packages with a known fix
Packages with versions affected by the advisory that have a greater version that is not affected.
2.67%
Total ecosystem affected
The proportion of packages in the ecosystem that are affected by the advisory (fixed or not).
Affected Version: Introduced: 0.0.0-20150717181359-44718f8a89b0, Last Affected: 3.2.0
Affected
v3.2.0+incompatible
v3.1.0+incompatible
v3.0.0+incompatible
v2.6.0+incompatible
v2.5.0+incompatible
v2.4.0+incompatible
v2.3.0+incompatible
v2.2.0+incompatible
v2.1.0+incompatible
v2.0.0+incompatible
v1.0.2
v1.0.1
v1.0.0
Affected Version: Introduced: 0, Fixed: 4.0.0-preview1