acryl-datahub missing JWT signature check
Critical severity
GitHub Reviewed
Published
Oct 28, 2022
in
datahub-project/datahub
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Oct 28, 2022
Published to the GitHub Advisory Database
Oct 31, 2022
Reviewed
Oct 31, 2022
Last updated
Feb 1, 2023
Missing JWT signature check (
GHSL-2022-078
)The
StatelessTokenService
of the DataHub metadata service (GMS) does not verify the signature of JWT tokens. This allows an attacker to connect to DataHub instances as any user if Metadata Service authentication is enabled. This vulnerability occurs because theStatelessTokenService
of the Metadata service uses theparse
method ofio.jsonwebtoken.JwtParser
, which does not perform a verification of the cryptographic token signature. This means that JWTs are accepted regardless of the used algorithm.Impact
This issue may lead to an authentication bypass.
Resources
References