JWT vulnerabilities pose serious security risks in modern web applications. Common attacks include signature bypass, algorithm confusion (switching from RS256 to HS256), weak secret brute-forcing, and injection attacks through header parameters like 'kid' and 'jku'. The guide covers exploitation techniques for each

โ€ข13m read timeโ€ขFrom pentesterlab.com
Post cover image
Table of contents
๐Ÿงช JSON Web Algorithms (JWA)๐Ÿ”„ One Website, Many JWT Implementations๐Ÿ”“ 1. Signature Not VerifiedโŒ 2. None Algorithm Attack๐Ÿง‚ 3. Trivial Secret (Weak HMAC Keys)๐Ÿ”€ 4. Algorithm Confusion (RSA to HMAC)๐Ÿ”€ 4b. Algorithm Confusion (ECDSA to HMAC)๐Ÿชค 5. kid Injection (Key ID Manipulation)๐Ÿงฌ 6. Embedded JWK (CVE-2018-0114)๐ŸŒ 7. JKU / X5U Header Abuse๐Ÿง™ 8. CVE-2022-21449 (Psychic Signature)๐Ÿ“š Final Thoughts: Mastering JWT Security
1 Comment

Sort: