Vulnerability Description
JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class. NOTE: the vendor disputes this because the "ignores" behavior cannot occur (in any version) unless there is a user error in how JJWT is used, and because the version that was actually tested must have been more than six years out of date.
CVSS Score
MEDIUM
References
- https://github.com/2308652512/JJWT_BUG
- https://github.com/jwtk/jjwt
- https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358
- https://www.viralpatel.net/java-create-validate-jwt-token/
- https://github.com/2308652512/JJWT_BUG
- https://github.com/jwtk/jjwt
- https://github.com/jwtk/jjwt/issues/930#issuecomment-2032699358
- https://www.viralpatel.net/java-create-validate-jwt-token/
FAQ
What is CVE-2024-31033?
CVE-2024-31033 is a vulnerability with a CVSS score of 6.8 (MEDIUM). JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtP...
How severe is CVE-2024-31033?
CVE-2024-31033 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-31033?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.