#JSONWebToken

Hacker Newsh4ckernews
2025-05-25

Ten Years of JSON Web Token (JWT) and Preparing for the Future

self-issued.info/?p=2708

Tedi Heriyantotedi@infosec.exchange
2023-09-09

Scott Arciszewski's post on How to Write a Secure JWT Library If You Absolutely Must: scottarc.blog/2023/09/06/how-t

#jwt #jsonwebtoken #cryptography #jws

Joey de Villa šŸŖ—AccordionGuy@mastodon.cloud
2023-05-16

Follow the JWT (JSON Web Token) Rabbit, collect all 13 pieces, and share your badge! It’s all part of Okta’s Developer Days, taking place today and tomorrow.

#Auth0 #Okta #Identity #DigitalIdentity #authorization #authentication #online #conference #DevDay #DeveloperDay #JWT #JSONWebToken #ScavengerHunt

developer.auth0.com/resources/

Here's the crate, FYI: github.com/JadedBlueEyes/jsonw. It's going pretty well.

Tags:
#Rust #JsonWebToken #cryptography

I implemented support for RSA-PSS padding in my #JsonWebToken crate today. I feel no closer to understanding crypto at all.

aegilops :github::microsoft:aegilops@fosstodon.org
2023-01-28

Ding, dong, the CVE is dead! :partyparrot:

The JWT nodejs "vulnerability" from December, popularised at the start of January, has been recognised as a non-issue 🫄

I'm really glad to see it gone. Hoping we get a rash of news stories to follow up on the torrent 🌊 that followed the Unit 42 blog...

I'm not sure if its removal was down to me raising an issue on the GitHub Advisory Database :omya_github: to ask for it to be removed.

#jwt #cve #errata #cve_2022_23529 #auth0 #unit42 #jsonwebtoken

šŸ‘Øā€šŸ’» ⇑⇑⇓⇓⇐⇒⇐⇒BAbacklogmann
2023-01-23

Ziemlich gut und ausführlich erklärt, wieso man JWT nutzen sollte: :scremcat: medium.com/swlh/why-do-we-need

Marius (windsheep) šŸ“”ā€‹ šŸ¦ƒā€‹ :CIAverified:​ :donor:​windsheep@infosec.exchange
2023-01-18

In the recent weeks developer ecosystem parts seem be be the #InfoSec weak spot no 1.

And a lot of the events are "published" behind #noindex flags to SEO-optimize the Public Relations. "We take security seriously... until it's serious". That's bad practice, and it helps no one. Be transparent about the issues.

* #pytorch got backdoored (apparently it was a test / dependency confusion attack)
pytorch.org/blog/compromised-n

* #CircleCI - automation holds secrets, compromised via a dev workstation. Customers have to change keys etc.
circleci.com/blog/jan-4-2023-i

* #Slack "breach" - they lost their code. Who knows what hardcoded secrets etc. they lost as well.
slack.com/intl/en-au/blog/news

* #jsonwebtoken - part of many JavaScript based #oauth stacks. An Authentication Bypass here is a total failure.
security.snyk.io/package/npm/j

* #datadog changes the #rpm gpg key due to the CircleCI issue. Which is proactive, and well thought of.
docs.datadoghq.com/agent/faq/c

* #x41 audited #git and they found severe vulns. This also affects CI systems, like #Jenkins or #GitHub Actions in some cases (if the Runner uses Git to build things).
x41-dsec.de/security/research/

What we learn: holistic #AppSec and Product Security has to look into these "mystical things" like the developer infrastructure, Software Bill Of Materials ( #sbom ), Continuous Integration etc. Things 99% of InfoSec professionals have 0 clue about.
In 2023 you should change that, and focus your training efforts there.

N_{Dario Fadda} :unverified:nuke@mastodon.insicurezzadigitale.com
2023-01-14

Online la seconda puntata del 2023 di #NINAsec !

Si parla degli impatti di #JsonWebToken e della sua vulnerabilitĆ , poi di #infostealers che stanno agitando le loro campagne malevole anche in Italia ā¤µļø

buttondown.email/ninasec/archi

https://purl.org/rzr#rzr
2023-01-12
2023-01-11

I see reports about a #JsonWebToken vulnerability (CVE-2022-23529), claiming that RCE is possible. Maybe I’m the one missing something here, but how could this possibly be exploited? Is that even a valid vulnerability report?

In order to exploit the vulnerability, someone needs to define a malicious toString function on the key object. Well, if they can do that – why do they need the library to call the function, can’t they do it themselves? They need to run JavaScript code on the server in order to create that function, meaning that the prerequisite for RCE is… šŸ„ā€‹ RCE!

There seems to be the assumption here that this key object can somehow be serialized along with the function, and then the library will deserialize it from some manipulated storage. But JSON doesn’t serialize function code, and neither does any other serialization format that JavaScript code might use.

Seriously, how is that going around in the news without anybody asking: is there a single realistic scenario where this CVSS score 7.6 (as assigned by the reporter) vulnerability could be abused?

2023-01-10

Popular JWT cloud security library patches ā€œremoteā€ code execution hole - It's remotely triggerable, but attackers would already have pretty deep network access if... nakedsecurity.sophos.com/2023/ #cryptography #jsonwebtoken #jwt #rce

heise onlineheiseonline
2023-01-10

Schadcode-Lücke in JsonWebToken-Bibliothek bedroht 22.000 Software-Projekte

Aufgrund einer Sicherheitslücke in einer weitverbreiteten Bibliothek sind Open-Source-Projekte von unter anderem IBM und Microsoft verwundbar.

heise.de/news/Schadcode-Luecke

Sam Stepanyan :verified: 🐘securestep9@infosec.exchange
2023-01-10

#jsonwebtoken High Severity Security #Vulnerability Found in "jsonwebtoken" #NPM Library (CVE-2022-23529). Attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted #JWT request. Update jsonwebtoken package to v9.0.0: thehackernews.com/2023/01/crit

2019-09-30

JSON Web Token (JSON Web Encryption) Authentication with Kirby CMS 3 - In yet another recent project, I’m building a book proposal submission... blog.mhgbrown.is/posts/8b72bbd #Dev #Kirby3 #Authentification #JSONWebToken by @mhgbrown@twitter.com

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst