Home / Vulnerability Database / Java : Unsafe JWT-token verification
Java
Java : Unsafe JWT-token verification
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
CWE
Overview
An unsafe way of verifying the JWT-token is used.
DefaultJwtParser method from io.jsonwebtoken.impl package verifies the token only if there is a signature. If a token without a signature is passed, the verification step will be skipped. This can lead to token tampering and leakage of confidential data.
MEDIUM
DerScanner Severity Score
Do you want to fix Java : Unsafe JWT-token verification in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
