Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2022-39227 PoC — Python-jwt subject to Authentication Bypass by Spoofing

Source
Associated Vulnerability
Title:Python-jwt subject to Authentication Bypass by Spoofing (CVE-2022-39227)
Description:python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to version 3.3.4. There are no known workarounds.
Description
A working POC found while doing a HTB challenge. Original: https://github.com/user0x1337/CVE-2022-39227
Readme
This repo belongs to https://github.com/user0x1337/CVE-2022-39227 I just copy it
File Snapshot

[4.0K] /data/pocs/cb6855ed52d968c244499ad15c0e7bddf2d37f5b ├── [4.0K] POC │   └── [4.0K] CVE-2022-39227 │   ├── [2.1K] cve_2022_39227.py │   ├── [2.1K] cve_2022_39227.py.save │   ├── [ 34K] LICENSE │   └── [1.4K] README.md └── [ 81] README.md 2 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →