以下是从截图中获取到的关键信息,以markdown格式简洁地呈现: --- 关键漏洞信息 漏洞标题: SQL injection in auth_jwt module via unescaped tag claim 漏洞编号: #3807 提交状态: Merged 提交者: razvancrainea 提交时间: 3 weeks ago --- 漏洞详情 摘要: SQL injection vulnerability in function. The 'tag' claim from JWT tokens was interpolated directly into SQL queries without escaping. Attackers could craft malicious JWTs with SQL injection payloads to bypass authentication. 描述: function in the auth_jwt module decodes JWT tokens without signature verification, then extracts the 'tag' claim into a raw SQL query without escaping. An attacker can craft a malicious JWT with SQL injection payload to inject their own secret into the query result for authentication bypass. 修复方案: Uses SQL to escape the tag value before interpolating into the SQL query. --- 参与者 报告人: Pavel Kohout, Aisle Research, www.aisle.com 合并者: razvancrainea 其他参与者: pavelkohout396 --- 提交记录 提交ID: 7691bb8 3822d33 2ce53bf 5d62ce5 * 9e2ab5f --- 此信息总结了漏洞的存在、影响及修复措施,并明确了提交者等相关信息。