Vulnerability Description
PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has to be used. Users should upgrade to v2.4.0 to receive a patch for this issue. As a workaround, always be explicit with the algorithms that are accepted and expected when decoding.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyjwt Project | Pyjwt | >= 1.5.0, < 2.4.0 |
| Fedoraproject | Fedora | 35 |
Related Weaknesses (CWE)
References
- https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fPatchThird Party Advisory
- https://github.com/jpadilla/pyjwt/releases/tag/2.4.0Release NotesThird Party Advisory
- https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fPatchThird Party Advisory
- https://github.com/jpadilla/pyjwt/releases/tag/2.4.0Release NotesThird Party Advisory
- https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.vicarius.io/vsociety/posts/risky-algorithms-algorithm-confusion-in-p
FAQ
What is CVE-2022-29217?
CVE-2022-29217 is a vulnerability with a CVSS score of 7.4 (HIGH). PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT ...
How severe is CVE-2022-29217?
CVE-2022-29217 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29217?
Check the references section above for vendor advisories and patch information. Affected products include: Pyjwt Project Pyjwt, Fedoraproject Fedora.