Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

项目引用了github.com/dgrijalva/jwt-go等185个开源组件,存在6个漏洞,建议升级 #16

Open
ghost opened this issue Mar 3, 2022 · 1 comment

Comments

@ghost
Copy link

ghost commented Mar 3, 2022

大佬,看你这个项目调用了github.com/dgrijalva/jwt-go等185个开源组件,存在6个安全漏洞,建议你升级下。

漏洞标题:jwt-go 安全漏洞
漏洞编号:CVE-2020-26160
漏洞描述:
jwt-go是个人开发者的一个Go语言的JWT实现。
jwt-go 4.0.0-preview1之前版本存在安全漏洞。攻击者可利用该漏洞在使用[]string{} for m[\"aud\"](规范允许)的情况下绕过预期的访问限制。
影响范围:(∞, 4.0.0-preview1)
最小修复版本:4.0.0-preview1
引入路径:
github.com/micro-plat/hydra@->github.com/micro-plat/[email protected]>github.com/dgrijalva/[email protected]+incompatible

另外5个漏洞 ,信息有点多我就不贴了,你自己看下完整报告:https://www.mfsec.cn/jr?p=ac69c4
你对这个issues有任何疑问可以回复我,我能看见哈。

@zkfy
Copy link
Contributor

zkfy commented Aug 19, 2022

感谢反馈,近期安排升级

https://www.mfsec.cn/jr?p=ac69c4 无法访问呢

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants
@zkfy and others