Show less detail
Detailed paths and remediation
-
Introduced through: root@0.0.0 › pyjwt@2.10.1
Fix: Upgrade pyjwt to version 2.12.0
-
Introduced through: root@0.0.0 › github3.py@4.0.1 › pyjwt@2.10.1
Fix: Pin pyjwt to version 2.12.0
Security information
Factors contributing to the scoring:
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to improper validation of the crit header parameter. An attacker can bypass critical header checks by crafting a JSON Web Signature (JWS) token with unrecognized critical extensions.
QA Notes
Please test login after this ticket is implemented
DEV Notes
null
Design
null
See full ticket and images here: FECFILE-2961
Pull Request: #1940