CVE-2024-33531
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2024
Last modified:
15/04/2026
Description
cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks by crafting a JWT with an enc header with the value A256GCM.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/cdbattags/lua-resty-jwt/commit/d1558e2afefe868fea1e7e9a4b04ea94ab678a85
- https://github.com/cdbattags/lua-resty-jwt/issues/61
- https://insinuator.net/2023/10/lua-resty-jwt-authentication-bypass/
- https://github.com/cdbattags/lua-resty-jwt/commit/d1558e2afefe868fea1e7e9a4b04ea94ab678a85
- https://github.com/cdbattags/lua-resty-jwt/issues/61
- https://insinuator.net/2023/10/lua-resty-jwt-authentication-bypass/



