Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-1000531 PoC — inversoft prime-jwt 输入验证漏洞

Source
Associated Vulnerability
Title:inversoft prime-jwt 输入验证漏洞 (CVE-2018-1000531)
Description:inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.
Description
Jwt Bruteforcer with CVE-2018-1000531 Test
Readme
# JWT-Bruteforcer

Basic Jwt Bruteforcer tool with CVE-2018-1000531 Vulnerability Test

Imported libraries:
jwt
base64

Requires minimum version of python 3.6.
File Snapshot

[4.0K] /data/pocs/b8d0ad36ab76cdde07517935fd59d9a125ce91a0 ├── [2.5K] jwtbruteforcer.py ├── [1.0K] LICENSE └── [ 160] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →