Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-9235

EPSS 37.48% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-9235

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
jsonwebtoken node模块安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
jsonwebtoken node module是一个用于node.js的JSON Web Taken(JWT)实现。 jsonwebtoken node模块4.2.2之前版本中存在安全漏洞,该漏洞源于程序使用了相同的签名来验证两种类型的令牌。攻击者可利用该漏洞绕过令牌验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
HackerOnejsonwebtoken node module <4.2.2 -

II. Public POCs for CVE-2015-9235

#POC DescriptionSource LinkShenlong Link
1JWT Key Confusion PoC (CVE-2015-9235) Written for the Hack the Box challenge - Under Constructionhttps://github.com/aalex954/jwt-key-confusion-pocPOC Details
2Nonehttps://github.com/WinDyAlphA/CVE-2015-9235_JWT_key_confusionPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-9235

Please Login to view more intelligence information

Same Patch Batch · HackerOne · 2018-05-29 · 50 CVEs total

CVE-2016-10679selenium-standalone-painful 安全漏洞
CVE-2017-16010i18next 跨站脚本漏洞
CVE-2017-16153gaoxuyan 路径遍历漏洞
CVE-2018-3733crud-file-server node模块路径遍历漏洞
CVE-2018-3734stattic node模块路径遍历漏洞
CVE-2018-3744html-pages node模块路径遍历漏洞
CVE-2018-3745Joyent Node.js atob 安全漏洞
CVE-2017-16062node-tkinter 安全漏洞
CVE-2016-10681roslib-socketio 安全漏洞
CVE-2016-10680adamvr-geoip-lite 安全漏洞
CVE-2016-10682massif 安全漏洞
CVE-2016-10674limbus-buildgen 安全漏洞
CVE-2016-10666tomita-parser 安全漏洞
CVE-2016-10659poco 安全漏洞
CVE-2016-10658native-opencv 安全漏洞
CVE-2016-10650ntfserver 安全漏洞
CVE-2016-10635broccoli-closure 安全漏洞
CVE-2016-10627scala-bin 安全漏洞
CVE-2016-10611strider-sauce 安全漏洞
CVE-2016-10601webdrvr 安全漏洞

Showing top 20 of 50 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2015-9235

No comments yet


Leave a comment