Skip to content

Commit 42dafe9

Browse files
committed
Incorporating review comments
2 parents 51d7170 + 6a55ab1 commit 42dafe9

File tree

2 files changed

+10
-6
lines changed

2 files changed

+10
-6
lines changed

CHANGELOG.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,13 @@ All notable changes to this add-on will be documented in this file.
33

44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
55

6+
## Unreleased
7+
8+
### Added
9+
- Support for validating usage of publicly well known HMac secrets for signing JWT.
10+
611
## [1.0.0] - 2020-09-03
712

813
- First version of JWT Support.
914
- Contains scanning rules for basic JWT related vulnerabilities.
10-
- Contains JWT Fuzzer for fuzzing the JWT's present in the request.
15+
- Contains JWT Fuzzer for fuzzing the JWT's present in the request.

src/main/resources/org/zaproxy/zap/extension/jwt/resources/Messages.properties

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -84,10 +84,11 @@ jwt.scanner.server.vulnerability.signatureAttack.jwkCustomKey.desc=JWT library i
8484
jwt.scanner.server.vulnerability.signatureAttack.jwkCustomKey.refs=https://nvd.nist.gov/vuln/detail/CVE-2018-0114
8585
jwt.scanner.server.vulnerability.signatureAttack.jwkCustomKey.soln=Validating Library should not depend on user provided input
8686

87-
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.name=Publicly well known HMac secret attack
88-
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.desc=JWT tokens signed using HMac algorithm requires secret key and there are publicly well known secret keys which should not be used for signing the JWT token as it can cause various attacks like identity theft, user impersonation etc.
87+
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.name=Publicly Well Known HMac Secret Attack
88+
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.desc=JSON web tokens signed using HMac algorithm requires secret key and there are publicly well known secret keys which should not be used for signing the JSON web token as it can cause various attacks like identity theft, user impersonation etc.
8989
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.refs=https://lab.wallarm.com/340-weak-jwt-secrets-you-should-check-in-your-code
9090
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.soln=Secret keys used for signing should not be publicly well known or easy to guess.
91+
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.param=JWT: \"{0}\" is signed by: \"{1}\"
9192

9293
jwt.scanner.server.vulnerability.payloadAttack.nullByte.name=Null Byte Injection Attack
9394
jwt.scanner.server.vulnerability.payloadAttack.nullByte.desc=Payload bytes after null byte are ignored ie not included in validation of JWT hence JWT validator is vulnerable to null byte injection
@@ -101,6 +102,4 @@ jwt.scanner.server.vulnerability.miscAttack.emptyTokens.soln=Tokens even if empt
101102

102103
# JWT scanner references and solutions
103104
jwt.scanner.refs=https://cheatsheetseries.owasp.org/cheatsheets/JSON_Web_Token_Cheat_Sheet_for_Java.html
104-
jwt.scanner.soln=See reference for further information. The solution depends on implementation details
105-
106-
jwt.scanner.server.vulnerability.signatureAttack.publiclyKnownSecrets.param=JWT: {0} is signed by: \"{1}\"
105+
jwt.scanner.soln=See reference for further information. The solution depends on implementation details

0 commit comments

Comments
 (0)