Skip to content

Security - Upgrade octokit/auth-app from 4.0.7 to 4.0.9 to Address CVEs#5

Merged
kj4ezj merged 1 commit intomainfrom
zach-jsonwebtoken
Jan 25, 2023
Merged

Security - Upgrade octokit/auth-app from 4.0.7 to 4.0.9 to Address CVEs#5
kj4ezj merged 1 commit intomainfrom
zach-jsonwebtoken

Conversation

@kj4ezj
Copy link
Copy Markdown

@kj4ezj kj4ezj commented Jan 25, 2023

This pull request attempts to address the following four CVEs by upgrading the minimum required version of @octokit/auth-app from v4.0.7 to v4.0.9, which implicitly upgrades jsonwebtoken to version 9.

  • CVE-2022-23529 - jsonwebtoken has insecure input validation in jwt.verify function
  • CVE-2022-23539 - jsonwebtoken unrestricted key type could lead to legacy keys usage
  • CVE-2022-23540 - jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
  • CVE-2022-23541 - jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC

@kj4ezj
Copy link
Copy Markdown
Author

kj4ezj commented Jan 25, 2023

PRed upstream in tibdex/github-app-token pull request 62.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant