Files
CVEs-PoC/2016/CVE-2016-10555.md
T
2025-09-29 21:09:30 +02:00

43 lines
2.0 KiB
Markdown

### [CVE-2016-10555](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10555)
![](https://img.shields.io/static/v1?label=Product&message=jwt-simple%20node%20module&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D0.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Input%20Validation%20(CWE-20)&color=brightgreen)
### Description
Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x0806/JWT-Security-Assessment
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Beijaflore-Security-LAB/JWTExploit
- https://github.com/CircuitSoul/poc-cve-2016-10555
- https://github.com/FroydCod3r/poc-cve-2016-10555
- https://github.com/HiitCat/JWT-SecLabs
- https://github.com/Nucleware/powershell-jwt
- https://github.com/The-Cracker-Technology/jwt_tool
- https://github.com/crpytoscooby/resourses_web
- https://github.com/d3ck9/HTB-Under-Construction
- https://github.com/d7cky/HTB-Under-Construction
- https://github.com/guchangan1/All-Defense-Tool
- https://github.com/mishmashclone/ticarpi-jwt_tool
- https://github.com/mxcezl/JWT-SecLabs
- https://github.com/n0-traces/cve_monitor
- https://github.com/puckiestyle/jwt_tool
- https://github.com/scent2d/PoC-CVE-2016-10555
- https://github.com/snakesec/jwt_tool
- https://github.com/techleadevelopers/Security-Stuffers-Lab
- https://github.com/techleadevelopers/red-team-ops
- https://github.com/thepcn3rd/jwtToken-CVE-2016-10555
- https://github.com/ticarpi/jwt_tool
- https://github.com/whoami13apt/tool-
- https://github.com/z-bool/Venom-JWT
- https://github.com/zhangziyang301/jwt_tool