[🐸 Frogbot] Update version of github.com/golang-jwt/jwt/v4 to 4.5.2 #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
📦 Vulnerable Dependencies
High
github.com/jfrog/jfrog-client-go:v1.49.1
github.com/golang-jwt/jwt/v4:v4.5.1
github.com/jfrog/jfrog-cli-core/v2:v2.57.7
🔖 Details
Vulnerability Details
Unbounded resource consumption in golang-jwt can lead to denial of service when an attacker client sends a malformed token.
🔬 JFrog Research Details
Description:
A design bug in Go
golang-jwtmodule may lead to denial of service when an attacker sends a malformed token to a server.The
parse.ParseUnverified()function starts with:If an attacker sends a token which has many dots (e.g. 100000) the
strings.Split()function might crash due to unexpected memory consumption which may lead to DoS.🐸 JFrog Frogbot