vital-ws / JS-WebGoat

WebGoat is a deliberately insecure application
https://owasp.org/www-project-webgoat/
Other
0 stars 0 forks source link

jjwt-0.9.1.jar: 1 vulnerabilities (highest severity is: 0.0) - autoclosed #16

Closed mend-for-github-com[bot] closed 5 months ago

mend-for-github-com[bot] commented 2 years ago
Vulnerable Library - jjwt-0.9.1.jar

Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

Library home page: https://github.com/jwtk/jjwt

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (jjwt version) Remediation Possible**
CVE-2024-31033 High 0.0 jjwt-0.9.1.jar Direct N/A

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-31033 ### Vulnerable Library - jjwt-0.9.1.jar

Sonatype helps open source projects to set up Maven repositories on https://oss.sonatype.org/

Library home page: https://github.com/jwtk/jjwt

Path to dependency file: /pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/io/jsonwebtoken/jjwt/0.9.1/jjwt-0.9.1.jar

Dependency Hierarchy: - :x: **jjwt-0.9.1.jar** (Vulnerable Library)

Found in base branch: develop

### Vulnerability Details

JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtParser class and the signWith() method within the DefaultJwtBuilder class. NOTE: the vendor disputes this because the "ignores" behavior cannot occur (in any version) unless there is a user error in how JJWT is used, and because the version that was actually tested must have been more than six years out of date.

Publish Date: 2024-04-01

URL: CVE-2024-31033

### CVSS 2 Score Details (0.0)

Base Score Metrics not available

mend-for-github-com[bot] commented 10 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

mend-for-github-com[bot] commented 6 months ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

mend-for-github-com[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.