漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
If an OpenID Connect provider supports the "none" algorithm (i.e., tokens with no signature), pac4j v5.3.0 (and prior) does not refuse it without an explicit configuration on its side or for the "idtoken" response type which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Pac4j 数据伪造问题漏洞
Vulnerability Description
Pac4j是一个简单而强大的 Java 安全引擎。用于验证用户、获取他们的配置文件和管理授权,以保护 Web 应用程序和 Web 服务。 Pac4j 中存在数据伪造问题漏洞,该漏洞源于产品在验证ID令牌时未使用有效算法。攻击者可通过该漏洞绕过令牌验证。以下产品及版本受到影响:Pac4j v5.1 版本及之前版本。
CVSS Information
N/A
Vulnerability Type
N/A