Skip to content

Commit cac7025

Browse files
1 parent 8bec951 commit cac7025

File tree

2 files changed

+156
-0
lines changed

2 files changed

+156
-0
lines changed
Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-869p-cjfg-cm3x",
4+
"modified": "2025-12-04T16:54:15Z",
5+
"published": "2025-12-04T16:54:15Z",
6+
"aliases": [
7+
"CVE-2025-65945"
8+
],
9+
"summary": "auth0/node-jws Improperly Verifies HMAC Signature",
10+
"details": "### Overview\nAn improper signature verification vulnerability exists when using auth0/node-jws with the HS256 algorithm under specific conditions.\n\n### Am I Affected?\nYou are affected by this vulnerability if you meet all of the following preconditions:\n\n1. Application uses the auth0/node-jws implementation of JSON Web Signatures, versions <=3.2.2 || 4.0.0\n2. Application uses the jws.createVerify() function for HMAC algorithms\n3. Application uses user-provided data from the JSON Web Signature Protected Header or Payload in the HMAC secret lookup routines\n\nYou are NOT affected by this vulnerability if you meet any of the following preconditions:\n1. Application uses the jws.verify() interface (note: `auth0/node-jsonwebtoken` users fall into this category and are therefore NOT affected by this vulnerability)\n2. Application uses only asymmetric algorithms (e.g. RS256)\n3. Application doesn’t use user-provided data from the JSON Web Signature Protected Header or Payload in the HMAC secret lookup routines\n\n### Fix\nUpgrade auth0/node-jws version to version 3.2.3 or 4.0.1\n\n### Acknowledgement\nOkta would like to thank Félix Charette for discovering this vulnerability.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "jws"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "3.2.3"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "jws"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "4.0.0"
48+
},
49+
{
50+
"fixed": "4.0.1"
51+
}
52+
]
53+
}
54+
],
55+
"versions": [
56+
"4.0.0"
57+
]
58+
}
59+
],
60+
"references": [
61+
{
62+
"type": "WEB",
63+
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
64+
},
65+
{
66+
"type": "WEB",
67+
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
68+
},
69+
{
70+
"type": "WEB",
71+
"url": "https://github.com/auth0/node-jws/commit/4f6e73f24df42f07d632dec6431ade8eda8d11a6"
72+
},
73+
{
74+
"type": "PACKAGE",
75+
"url": "https://github.com/auth0/node-jws"
76+
},
77+
{
78+
"type": "WEB",
79+
"url": "https://github.com/auth0/node-jws/releases/tag/v3.2.3"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/auth0/node-jws/releases/tag/v4.0.1"
84+
}
85+
],
86+
"database_specific": {
87+
"cwe_ids": [
88+
"CWE-347"
89+
],
90+
"severity": "HIGH",
91+
"github_reviewed": true,
92+
"github_reviewed_at": "2025-12-04T16:54:15Z",
93+
"nvd_published_at": null
94+
}
95+
}
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9gqj-5w7c-vx47",
4+
"modified": "2025-12-04T16:55:06Z",
5+
"published": "2025-12-04T16:55:06Z",
6+
"aliases": [
7+
"CVE-2025-66479"
8+
],
9+
"summary": "Anthropic Sandbox Runtime Incorrectly Implemented Network Sandboxing ",
10+
"details": "Due to a bug in sandboxing logic, `sandbox-runtime` did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16. \n\nThank you to https://github.com/bendrucker for reporting this issue!",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@anthropic-ai/sandbox-runtime"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.0.16"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/anthropic-experimental/sandbox-runtime/security/advisories/GHSA-9gqj-5w7c-vx47"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/anthropic-experimental/sandbox-runtime/commit/bea2930cc1db9c73a1b15acf6dc19c5261aec1f3"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/anthropic-experimental/sandbox-runtime"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-693"
55+
],
56+
"severity": "LOW",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-12-04T16:55:06Z",
59+
"nvd_published_at": null
60+
}
61+
}

0 commit comments

Comments
 (0)