Skip to content

Commit 9110df6

Browse files
committed
Merge branch 'amammad-java-JWT' of https://github.com/am0o0/codeql into amammad-java-JWT
2 parents c6814fc + 8f52b2c commit 9110df6

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

java/ql/src/experimental/Security/CWE/CWE-347/Auth0NoVerifier.qhelp

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,33 +2,30 @@
22
<qhelp>
33
<overview>
44
<p>
5-
A JSON Web Token (JWT) is used for authenticating and managing users in an application.
6-
</p>
7-
<p>
8-
Only Decoding JWTs without checking if they have a valid signature or not can lead to security vulnerabilities.
5+
A JSON Web Token (JWT) is used for authenticating and managing users in an application. It must be verified in order to ensure the JWT is genuine.
96
</p>
107

118
</overview>
129
<recommendation>
1310

1411
<p>
15-
Don't use methods that only decode JWT, Instead use methods that verify the signature of JWT.
12+
Don't use information from a JWT without verifying that JWT.
1613
</p>
1714

1815
</recommendation>
1916
<example>
2017

2118
<p>
22-
The following code you can see an Example from a popular Library.
19+
The following example illustrates secure and insecure use of the Auth0 `java-jwt` library.
2320
</p>
2421

2522
<sample src="Example.java" />
2623

2724
</example>
2825
<references>
2926
<li>
30-
<a href="CVE-2021-37580">The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.</a>
27+
<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-37580">The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.</a>
3128
</li>
3229
</references>
3330

34-
</qhelp>
31+
</qhelp>

0 commit comments

Comments
 (0)