CWE-347
OWASP 2017-A2
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

JWT Forgery via Chaining Jku Parameter with Open Redirect

Severity:
High
Summary

Invicti detected that the application is vulnerable to the Json Web Tokens (JWT) “jku” header signature bypass through an open redirect.

Impact

By changing the value of the jku parameter in the header, an attacker can force the application to utilize a malicious JWT and bypass the signature. If URL filtering is in place within the application an attacker might chain this attack with an open redirect to bypass URL filtering and forge their own signature.

Remediation

The application has to have the list of allowed hosts and have correct URL filtering in place. Also, the application must not contain other vulnerabilities that an attacker can chain to bypass URL filtering such as:

  • Open redirect
  • Header Injection
  • SSRF
Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.