Skip to content
This repository has been archived by the owner on Aug 22, 2024. It is now read-only.

TC-458 Fix highest security dependency #5

Merged
merged 1 commit into from
Jan 6, 2022
Merged

Conversation

quanqigu
Copy link
Collaborator

@quanqigu quanqigu commented Jan 6, 2022

CVE-2021-42836
high severity
Vulnerable versions: < 1.9.3
Patched version: 1.9.3
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.

CVE-2020-26160
high severity
Vulnerable versions: <= 3.2.0
Patched version: No fix
jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to golang-jwt at version 3.2.1

@quanqigu quanqigu marked this pull request as ready for review January 6, 2022 06:43
@nickturing nickturing merged commit b06dd47 into master Jan 6, 2022
@nickturing nickturing deleted the bugfix/gjson branch January 6, 2022 18:12
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants