ID

VAR-201801-1063


CVE

CVE-2018-0114


TITLE

Cisco node-jose Vulnerability related to key management errors in open source libraries

Trust: 0.8

sources: JVNDB: JVNDB-2018-001335

DESCRIPTION

A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header. Cisco Node-jose Library is prone to a remote security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to gain unauthorized access. This may aid in further attacks

Trust: 2.07

sources: NVD: CVE-2018-0114 // JVNDB: JVNDB-2018-001335 // BID: 102445 // VULHUB: VHN-118316 // VULMON: CVE-2018-0114

AFFECTED PRODUCTS

vendor:ciscomodel:node-josescope:ltversion:0.11.0

Trust: 1.8

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.5

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.4

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.3

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.2

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.1

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.9.0

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:eqversion:0.10.0

Trust: 0.3

vendor:ciscomodel:node-jose libraryscope:neversion:0.11.0

Trust: 0.3

sources: BID: 102445 // JVNDB: JVNDB-2018-001335 // NVD: CVE-2018-0114

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0114
value: HIGH

Trust: 1.0

NVD: CVE-2018-0114
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201801-204
value: HIGH

Trust: 0.6

VULHUB: VHN-118316
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-0114
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0114
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-118316
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0114
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-0114
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-118316 // VULMON: CVE-2018-0114 // JVNDB: JVNDB-2018-001335 // CNNVD: CNNVD-201801-204 // NVD: CVE-2018-0114

PROBLEMTYPE DATA

problemtype:CWE-347

Trust: 1.1

problemtype:CWE-320

Trust: 0.9

sources: VULHUB: VHN-118316 // JVNDB: JVNDB-2018-001335 // NVD: CVE-2018-0114

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201801-204

TYPE

data forgery

Trust: 0.6

sources: CNNVD: CNNVD-201801-204

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-001335

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-118316 // VULMON: CVE-2018-0114

PATCH

title:0.11.0 (2017-11-30)url:https://github.com/cisco/node-jose/blob/master/CHANGELOG.md

Trust: 0.8

title:Alert ID: 56326url:https://tools.cisco.com/security/center/viewAlert.x?alertId=56326

Trust: 0.8

title:Cisco node-jose open source library Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77519

Trust: 0.6

title:PSJsonWebTokenurl:https://github.com/anthonyg-1/PSJsonWebToken

Trust: 0.1

title:CVE-2018-0114url:https://github.com/Eremiel/CVE-2018-0114

Trust: 0.1

title:CVE-2018-0114url:https://github.com/Starry-lord/CVE-2018-0114

Trust: 0.1

title:CVE-2018-0114url:https://github.com/scumdestroy/CVE-2018-0114

Trust: 0.1

title:burp-jwt-fuzzhelper-extensionurl:https://github.com/pinnace/burp-jwt-fuzzhelper-extension

Trust: 0.1

title:forgerurl:https://github.com/freddd/forger

Trust: 0.1

title:POC-CVE-2018-0114url:https://github.com/adityathebe/POC-CVE-2018-0114

Trust: 0.1

title:POC-CVE-2018-0114url:https://github.com/zi0Black/POC-CVE-2018-0114

Trust: 0.1

title:jwt_toolurl:https://github.com/ticarpi/jwt_tool

Trust: 0.1

title:ticarpi-jwt_toolurl:https://github.com/mishmashclone/ticarpi-jwt_tool

Trust: 0.1

title:pentester-bounty-hunter-scriptsurl:https://github.com/scumdestroy/pentester-bounty-hunter-scripts

Trust: 0.1

title:jwt_toolurl:https://github.com/The-Cracker-Technology/jwt_tool

Trust: 0.1

title:jwt_toolurl:https://github.com/puckiestyle/jwt_tool

Trust: 0.1

title:Exp101tsArchiv30thersurl:https://github.com/nu11secur1ty/Exp101tsArchiv30thers

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:awesome-cve-poc_qazbnm456url:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

title:CVE-POCurl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2018-0114 // JVNDB: JVNDB-2018-001335 // CNNVD: CNNVD-201801-204

EXTERNAL IDS

db:NVDid:CVE-2018-0114

Trust: 2.9

db:BIDid:102445

Trust: 2.1

db:EXPLOIT-DBid:44324

Trust: 1.8

db:JVNDBid:JVNDB-2018-001335

Trust: 0.8

db:CNNVDid:CNNVD-201801-204

Trust: 0.7

db:CXSECURITYid:WLB-2018030192

Trust: 0.6

db:PACKETSTORMid:146864

Trust: 0.1

db:VULHUBid:VHN-118316

Trust: 0.1

db:VULMONid:CVE-2018-0114

Trust: 0.1

sources: VULHUB: VHN-118316 // VULMON: CVE-2018-0114 // BID: 102445 // JVNDB: JVNDB-2018-001335 // CNNVD: CNNVD-201801-204 // NVD: CVE-2018-0114

REFERENCES

url:https://tools.cisco.com/security/center/viewalert.x?alertid=56326

Trust: 2.2

url:http://www.securityfocus.com/bid/102445

Trust: 1.9

url:https://www.exploit-db.com/exploits/44324/

Trust: 1.9

url:https://github.com/cisco/node-jose/blob/master/changelog.md

Trust: 1.8

url:https://github.com/zi0black/poc-cve-2018-0114

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0114

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0114

Trust: 0.8

url:https://cxsecurity.com/issue/wlb-2018030192

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/347.html

Trust: 0.1

url:https://github.com/anthonyg-1/psjsonwebtoken

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-118316 // VULMON: CVE-2018-0114 // BID: 102445 // JVNDB: JVNDB-2018-001335 // CNNVD: CNNVD-201801-204 // NVD: CVE-2018-0114

CREDITS

Andrea Cappa

Trust: 0.6

sources: CNNVD: CNNVD-201801-204

SOURCES

db:VULHUBid:VHN-118316
db:VULMONid:CVE-2018-0114
db:BIDid:102445
db:JVNDBid:JVNDB-2018-001335
db:CNNVDid:CNNVD-201801-204
db:NVDid:CVE-2018-0114

LAST UPDATE DATE

2024-11-23T23:12:16.409000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118316date:2020-09-04T00:00:00
db:VULMONid:CVE-2018-0114date:2020-09-04T00:00:00
db:BIDid:102445date:2018-01-08T00:00:00
db:JVNDBid:JVNDB-2018-001335date:2018-02-08T00:00:00
db:CNNVDid:CNNVD-201801-204date:2021-08-18T00:00:00
db:NVDid:CVE-2018-0114date:2024-11-21T03:37:32.987

SOURCES RELEASE DATE

db:VULHUBid:VHN-118316date:2018-01-04T00:00:00
db:VULMONid:CVE-2018-0114date:2018-01-04T00:00:00
db:BIDid:102445date:2018-01-08T00:00:00
db:JVNDBid:JVNDB-2018-001335date:2018-02-08T00:00:00
db:CNNVDid:CNNVD-201801-204date:2018-01-05T00:00:00
db:NVDid:CVE-2018-0114date:2018-01-04T06:29:00.417