Home / Vulnerability Database / Java : Unsafe JWT-token verification
Java

Java : Unsafe JWT-token verification

Classification

Overview

An unsafe way of verifying the JWT-token is used.

DefaultJwtParser method from io.jsonwebtoken.impl package verifies the token only if there is a signature. If a token without a signature is passed, the verification step will be skipped. This can lead to token tampering and leakage of confidential data.

MEDIUM

DerScanner Severity Score

Do you want to fix Java : Unsafe JWT-token verification in your application?

See also

Java

Java : Race condition

Java

Java : Text4Shell Vulnerability

Java

Java : JNI usage