Skip to content

Authentication Bypass via Token Forgery

High
sawall published GHSA-45ff-37jm-xjfx Sep 15, 2021

Package

jitsi-meet (lua)

Affected versions

< 2.0.2.0.5963

Patched versions

2.0.5963

Description

Impact

A Prosody module allows the use of symmetrical algorithms to validate JWTs. This means that tokens generated by arbitrary sources can be used to gain authorization to protected rooms. There are no known incidents related to this vulnerability.

Patches

The issue was patched with this PR: #9319
A related warning comment was published with this PR: #9753

Workarounds

There are no workarounds.

References

None

Credits

Reported by: https://github.com/cyber-crypt-com
Nils Engelbertz

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

No known CVE

Weaknesses

No CWEs