You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-347/Auth0NoVerifier.qhelp
+5-8Lines changed: 5 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -2,33 +2,30 @@
2
2
<qhelp>
3
3
<overview>
4
4
<p>
5
-
A JSON Web Token (JWT) is used for authenticating and managing users in an application.
6
-
</p>
7
-
<p>
8
-
Only Decoding JWTs without checking if they have a valid signature or not can lead to security vulnerabilities.
5
+
A JSON Web Token (JWT) is used for authenticating and managing users in an application. It must be verified in order to ensure the JWT is genuine.
9
6
</p>
10
7
11
8
</overview>
12
9
<recommendation>
13
10
14
11
<p>
15
-
Don't use methods that only decode JWT, Instead use methods that verify the signature of JWT.
12
+
Don't use information from a JWT without verifying that JWT.
16
13
</p>
17
14
18
15
</recommendation>
19
16
<example>
20
17
21
18
<p>
22
-
The following code you can see an Example from a popular Library.
19
+
The following example illustrates secure and insecure use of the Auth0 `java-jwt` library.
23
20
</p>
24
21
25
22
<samplesrc="Example.java" />
26
23
27
24
</example>
28
25
<references>
29
26
<li>
30
-
<ahref="CVE-2021-37580">The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.</a>
27
+
<ahref="https://nvd.nist.gov/vuln/detail/CVE-2021-37580">The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.</a>
0 commit comments