Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - opentok/opentok-v4.3.0
Found in HEAD commit: cc472db069ddc4f883e28f44f6bc0dc6fdd76365
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-46743
### Vulnerable Library - firebase/php-jwt-v5.0.0A simple library to encode and decode JSON Web Tokens (JWT) in PHP. Should conform to the current spec.
Library home page: https://api.github.com/repos/firebase/php-jwt/zipball/9984a4d3a32ae7673d6971ea00bae9d0a1abba0e
Dependency Hierarchy: - opentok/opentok-v4.3.0 (Root Library) - :x: **firebase/php-jwt-v5.0.0** (Vulnerable Library)
Found in HEAD commit: cc472db069ddc4f883e28f44f6bc0dc6fdd76365
Found in base branch: main
### Vulnerability DetailsIn Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Publish Date: 2022-03-29
URL: CVE-2021-46743
### CVSS 3 Score Details (9.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46743
Release Date: 2022-03-29
Fix Resolution: v6.0.0