Skip to content

Commit 1bb584b

Browse files
committed
Verification with an asymmetric key of a token signed with a symmetric key
There is a vulnerability in this module when the verification part is expecting a token digitally signed with an asymetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family). The issue is because this library has the very same signature to verify both type of tokens (parameter: `secretOrPublicKey`). This change adds a new parameter to the verify called `algorithms`. This can be used to specify a list of supported algorithms, but the default value depends on the secret used: if the secretOrPublicKey contains the string `BEGIN CERTIFICATE` the default is `[ 'RS256','RS384','RS512','ES256','ES384','ES512' ]` otherwise is `[ 'HS256','HS384','HS512' ]`.
1 parent f9f3c34 commit 1bb584b

File tree

3 files changed

+33
-1
lines changed

3 files changed

+33
-1
lines changed

.jshintrc

+2-1
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@
1515
"it": true,
1616
"require": true,
1717
"atob": false,
18-
"escape": true
18+
"escape": true,
19+
"before": true
1920
}
2021
}

index.js

+11
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,12 @@ module.exports.verify = function(jwtString, secretOrPublicKey, options, callback
107107
return done(new JsonWebTokenError('jwt signature is required'));
108108
}
109109

110+
if (!options.algorithms) {
111+
options.algorithms = ~secretOrPublicKey.toString().indexOf('BEGIN CERTIFICATE') ?
112+
[ 'RS256','RS384','RS512','ES256','ES384','ES512' ] :
113+
[ 'HS256','HS384','HS512' ];
114+
}
115+
110116
var valid;
111117

112118
try {
@@ -126,6 +132,11 @@ module.exports.verify = function(jwtString, secretOrPublicKey, options, callback
126132
return done(err);
127133
}
128134

135+
var header = jws.decode(jwtString).header;
136+
if (!~options.algorithms.indexOf(header.alg)) {
137+
return done(new JsonWebTokenError('invalid signature'));
138+
}
139+
129140
if (typeof payload.exp !== 'undefined' && !options.ignoreExpiration) {
130141
if (typeof payload.exp !== 'number') {
131142
return done(new JsonWebTokenError('invalid exp value'));

test/wrong_alg.tests.js

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
var fs = require('fs');
2+
var path = require('path');
3+
var jwt = require('../index');
4+
var JsonWebTokenError = require('../lib/JsonWebTokenError');
5+
var expect = require('chai').expect;
6+
7+
8+
var pub = fs.readFileSync(path.join(__dirname, 'pub.pem'), 'utf8');
9+
// priv is never used
10+
// var priv = fs.readFileSync(path.join(__dirname, 'priv.pem'));
11+
12+
var TOKEN = 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmb28iOiJiYXIiLCJpYXQiOjE0MjY1NDY5MTl9.ETgkTn8BaxIX4YqvUWVFPmum3moNZ7oARZtSBXb_vP4';
13+
14+
describe('signing with pub key as symmetric', function () {
15+
it('should not verify', function () {
16+
expect(function () {
17+
jwt.verify(TOKEN, pub);
18+
}).to.throw(JsonWebTokenError, /invalid signature/);
19+
});
20+
});

0 commit comments

Comments
 (0)