SYM_JSTS_0161 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Use of a Broken or Risky Cryptographic Algorithm

Property Value
Language javascript
Severity high
CWE CWE-327: Use of a Broken or Risky Cryptographic Algorithm
OWASP A03:2017 - Sensitive Data Exposure
Confidence Level High
Impact Level Medium
Likelihood Level High

Description

Detected use of the 'none' algorithm in a JWT token. The 'none' algorithm assumes the integrity of the token has already been verified. This would allow a malicious actor to forge a JWT token that will automatically be verified. Do not explicitly use the 'none' algorithm. Instead, use an algorithm such as 'HS256'.