GO-2020-0017

Source
https://pkg.go.dev/vuln/GO-2020-0017
Import Source
https://vuln.go.dev/ID/GO-2020-0017.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2020-0017
Aliases
Published
2021-04-14T20:04:52Z
Modified
2024-08-01T08:56:46.468227Z
Summary
Authorization bypass in github.com/dgrijalva/jwt-go
Details

If a JWT contains an audience claim with an array of strings, rather than a single string, and MapClaims.VerifyAudience is called with req set to false, then audience verification will be bypassed, allowing an invalid set of audiences to be provided.

References
Credits
    • @christopher-wong

Affected packages

Go / github.com/dgrijalva/jwt-go

Package

Name
github.com/dgrijalva/jwt-go
View open source insights on deps.dev
Purl
pkg:golang/github.com/dgrijalva/jwt-go

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-20150717181359-44718f8a89b0

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/dgrijalva/jwt-go",
            "symbols": [
                "MapClaims.VerifyAudience"
            ]
        }
    ]
}

Go / github.com/dgrijalva/jwt-go/v4

Package

Name
github.com/dgrijalva/jwt-go/v4
View open source insights on deps.dev
Purl
pkg:golang/github.com/dgrijalva/jwt-go/v4

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.0-preview1

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/dgrijalva/jwt-go/v4",
            "symbols": [
                "MapClaims.VerifyAudience"
            ]
        }
    ]
}