Skip to content

Conversation

@simo5
Copy link
Member

@simo5 simo5 commented Sep 13, 2022

Note this fix technically breaks the current JWT api.
unfortunately there was no way to address this weakness without a change in semantics.

This means some applications may throw exceptions in some cases that were previously handled.

A knob to alter this behavior has been provided for applications that can't immediately refactor but still wants a way to upgrade t later jwcrypto releases.

This is needed to address CVE-2022-3102.
Thanks to Tom tervoort from Secura for finding and reporting this issue.

Also test that "unepxected" token types are not validated

Signed-off-by: Simo Sorce <[email protected]>
Because the previous patch changes the behavoir of jwcrypto, this knob
is a quick way for application developers to get back the old behavior
temporarily without having to change the code immediately as it may
require some significant refactoring, depending on how the application
was written.

This is not intended to be used in the long term and will be eventually
deleted. Unfortunately I cannot decorate a simply global variable with
the @deprecated decoration to make it clearer.

Signed-off-by: Simo Sorce <[email protected]>
@simo5 simo5 merged commit 34b6525 into latchset:master Sep 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant