Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10555 PoC — jwt-simple 安全漏洞

Source
Associated Vulnerability
Title:jwt-simple 安全漏洞 (CVE-2016-10555)
Description:Since "algorithm" isn't enforced in jwt.decode()in jwt-simple 0.3.0 and earlier, a malicious user could choose what algorithm is sent sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
Description
CVE-2016-10555 PoC code
File Snapshot

[4.0K] /data/pocs/f8f83c66abd6deb3965580cbb777b97200aed095 ├── [1.1K] app.py ├── [ 565] PoC.py ├── [1.6K] private.pem ├── [ 459] public.pem └── [ 256] requirements.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →