We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The lua-resty-jwt and api7-lua-resty-jwt dependencies contain an authentication bypass with makes the jwt-auth plugin also vulnerable. As the vulnerability was not fixed for over a year in the lua-resty-jwt library details were made public through cdbattags/lua-resty-jwt#62.
jwt-auth
This issue is intended to make the authors of the jwt-auth plugin aware of this vulnerability.
apisix version
uname -a
openresty -V
nginx -V
curl http://127.0.0.1:9090/v1/server_info
luarocks --version
The text was updated successfully, but these errors were encountered:
Raised a PR: api7/lua-resty-jwt#5, will close this issue once it gets merged. Thanks.
Sorry, something went wrong.
Thanks for your reporting @nemmerich
I will take a look
shreemaan-abhishek
Successfully merging a pull request may close this issue.
Description
The lua-resty-jwt and api7-lua-resty-jwt dependencies contain an authentication bypass with makes the
jwt-auth
plugin also vulnerable. As the vulnerability was not fixed for over a year in the lua-resty-jwt library details were made public through cdbattags/lua-resty-jwt#62.This issue is intended to make the authors of the
jwt-auth
plugin aware of this vulnerability.Environment
apisix version
):uname -a
):openresty -V
ornginx -V
):curl http://127.0.0.1:9090/v1/server_info
):luarocks --version
):The text was updated successfully, but these errors were encountered: