Skip to content

Commit a17f612

Browse files
1 parent ee0e1db commit a17f612

File tree

2 files changed

+11
-41
lines changed

2 files changed

+11
-41
lines changed

advisories/github-reviewed/2021/05/GHSA-2c64-vj8g-vwrq/GHSA-2c64-vj8g-vwrq.json

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2c64-vj8g-vwrq",
4-
"modified": "2023-08-29T22:08:18Z",
4+
"modified": "2025-10-03T19:21:51Z",
55
"published": "2021-05-21T16:11:49Z",
66
"aliases": [],
77
"summary": "Incorrect handling of credential expiry by /nats-io/nats-server",
@@ -26,25 +26,6 @@
2626
]
2727
}
2828
]
29-
},
30-
{
31-
"package": {
32-
"ecosystem": "Go",
33-
"name": "github.com/nats-io/jwt"
34-
},
35-
"ranges": [
36-
{
37-
"type": "ECOSYSTEM",
38-
"events": [
39-
{
40-
"introduced": "0"
41-
},
42-
{
43-
"fixed": "1.1.0"
44-
}
45-
]
46-
}
47-
]
4829
}
4930
],
5031
"references": [
@@ -59,6 +40,10 @@
5940
{
6041
"type": "WEB",
6142
"url": "https://advisories.nats.io/CVE/CVE-2020-26892.txt"
43+
},
44+
{
45+
"type": "PACKAGE",
46+
"url": "https://github.com/nats-io/nats-server"
6247
}
6348
],
6449
"database_specific": {

advisories/github-reviewed/2022/02/GHSA-4w5x-x539-ppf5/GHSA-4w5x-x539-ppf5.json

Lines changed: 6 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4w5x-x539-ppf5",
4-
"modified": "2024-05-20T21:19:19Z",
4+
"modified": "2025-10-03T19:21:38Z",
55
"published": "2022-02-11T23:42:20Z",
66
"aliases": [
77
"CVE-2020-26892"
88
],
99
"summary": "Incorrect handling of credential expiry by /nats-io/nats-server",
10-
"details": "\n## Problem Description\n\nNATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled.\n\nThe NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API.\n\nA new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it.\n\nThe CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications.\n\n\n## Affected versions\n\n#### JWT library\n\n * all versions prior to 1.1.0\n * fixed after nats-io/jwt PR 103 landed (2020-10-06)\n\n#### NATS Server\n\n * Version 2 prior to 2.1.9\n + 2.0.0 through and including 2.1.8 are vulnerable.\n * fixed with nats-io/nats-server PRs 1632, 1635, 1645\n\n\n## Impact\n\nTime-based credential expiry did not work.\n\n\n## Workaround\n\nHave credentials which only expire after fixes can be deployed.\n\n\n## Solution\n\nUpgrade the JWT dependency in any application using it.\n\nUpgrade the NATS server if using NATS Accounts.",
10+
"details": "## Problem Description\n\nNATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled.\n\nThe NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which misused its own API.\n\nA new `IsClaimRevoked()` method has correct handling and the nats-server has been updated to use this. The old `IsRevoked()` method now always returns true and other client code will have to be updated to avoid calling it.\n\nThe CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications.\n\n\n## Affected versions\n\n#### JWT library\n\n * all versions prior to 1.1.0\n * fixed after nats-io/jwt PR 103 landed (2020-10-06)\n\n#### NATS Server\n\n * Version 2 prior to 2.1.9\n + 2.0.0 through and including 2.1.8 are vulnerable.\n * fixed with nats-io/nats-server PRs 1632, 1635, 1645\n\n\n## Impact\n\nTime-based credential expiry did not work.\n\n\n## Workaround\n\nHave credentials which only expire after fixes can be deployed.\n\n\n## Solution\n\nUpgrade the JWT dependency in any application using it.\n\nUpgrade the NATS server if using NATS Accounts.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -33,25 +33,6 @@
3333
]
3434
}
3535
]
36-
},
37-
{
38-
"package": {
39-
"ecosystem": "Go",
40-
"name": "github.com/nats-io/nats-server/v2"
41-
},
42-
"ranges": [
43-
{
44-
"type": "ECOSYSTEM",
45-
"events": [
46-
{
47-
"introduced": "0"
48-
},
49-
{
50-
"fixed": "2.1.9"
51-
}
52-
]
53-
}
54-
]
5536
}
5637
],
5738
"references": [
@@ -75,6 +56,10 @@
7556
"type": "WEB",
7657
"url": "https://advisories.nats.io/CVE/CVE-2020-26892.txt"
7758
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/nats-io/jwt"
62+
},
7863
{
7964
"type": "WEB",
8065
"url": "https://github.com/nats-io/nats-server/commits/master"

0 commit comments

Comments
 (0)