The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.
Metrics
Affected Vendors & Products
References
History
Thu, 08 May 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Json-jwt Project
Json-jwt Project json-jwt |
|
CPEs | cpe:2.3:a:json-jwt_project:json-jwt:1.16.3:*:*:*:*:ruby:*:* | |
Vendors & Products |
Json-jwt Project
Json-jwt Project json-jwt |
Mon, 26 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-284 | |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2023-12-25T00:00:00
Updated: 2024-08-26T20:08:16.108Z
Reserved: 2023-12-25T00:00:00
Link: CVE-2023-51774

Updated: 2024-08-02T22:48:11.253Z

Status : Analyzed
Published: 2024-02-29T01:42:05.597
Modified: 2025-05-08T22:48:00.990
Link: CVE-2023-51774
