File tree Expand file tree Collapse file tree 1 file changed +4
-7
lines changed
java/ql/src/experimental/Security/CWE/CWE-347 Expand file tree Collapse file tree 1 file changed +4
-7
lines changed Original file line number Diff line number Diff line change 2
2
<qhelp >
3
3
<overview >
4
4
<p >
5
- A JSON Web Token (JWT) is used for authenticating and managing users in an application.
6
- </p >
7
- <p >
8
- Only Decoding JWTs without checking if they have a valid signature or not can lead to security vulnerabilities.
5
+ A JSON Web Token (JWT) is used for authenticating and managing users in an application. It must be verified in order to ensure the JWT is genuine.
9
6
</p >
10
7
11
8
</overview >
12
9
<recommendation >
13
10
14
11
<p >
15
- Don't use methods that only decode JWT, Instead use methods that verify the signature of JWT.
12
+ Don't use information from a JWT without verifying that JWT.
16
13
</p >
17
14
18
15
</recommendation >
19
16
<example >
20
17
21
18
<p >
22
- The following code you can see an Example from a popular Library .
19
+ The following example illustrates secure and insecure use of the Auth0 `java-jwt` library .
23
20
</p >
24
21
25
22
<sample src =" Example.java" />
31
28
</li >
32
29
</references >
33
30
34
- </qhelp >
31
+ </qhelp >
You can’t perform that action at this time.
0 commit comments