Skip to main content

Use of a Broken or Risky Cryptographic Algorithm

CVE-2015-9235

Severity High
Score 9.8/10

Summary

In the jsonwebtoken package priors to version 4.2.2, an attacker can bypass verification when a token is digitally signed with an asymmetric key (RS/ES family) algorithm, but instead sends a token digitally signed with a symmetric algorithm (HS* family).

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

Advisory Timeline

  • Published