File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed
go/ql/src/Security/CWE-347 Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change 9
9
library, or use a library that verifies it by default.</p >
10
10
</recommendation >
11
11
<example >
12
- <p >The following example shows a case where a JWT is parsed without verifying the
12
+ <p >The following (bad) example shows a case where a JWT is parsed without verifying the
13
13
signature.</p >
14
14
<sample src =" MissingJwtSignatureCheckBad.go" />
15
- <p >In the example below, the appropriate function for parsing a JWT
16
- and verifying its signature is used .</p >
15
+ <p >The following (good) example uses the appropriate function for parsing a JWT
16
+ and verifying its signature.</p >
17
17
<sample src =" MissingJwtSignatureCheckGood.go" />
18
18
</example >
19
19
<references >
Original file line number Diff line number Diff line change 1
1
/**
2
2
* @name Missing JWT signature check
3
- * @description Failing to check the Json Web Token (JWT) signature may allow an attacker to forge their own tokens.
3
+ * @description Failing to check the JSON Web Token (JWT) signature may allow an attacker to forge their own tokens.
4
4
* @kind path-problem
5
5
* @problem.severity error
6
6
* @security-severity 7.8
You can’t perform that action at this time.
0 commit comments