jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
HIGH Vulnerable Package issue exists @ github.com/dgrijalva/jwt-go in branch master
Description
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
HIGH Vulnerable Package issue exists @ github.com/dgrijalva/jwt-go in branch master
Vulnerability ID: CVE-2020-26160
Package Name: github.com/dgrijalva/jwt-go
Severity: HIGH
CVSS Score: 7.5
Publish Date: 2020-09-30T18:15:00
Current Package Version: v3.2.0
Remediation Upgrade Recommendation: v3.2.1-0.20180308231308-06ea1031745c+incompatible
Link To SCA
Reference – NVD link