JWT vulnerabilities pose serious security risks in modern web applications. Common attacks include signature bypass, algorithm confusion (switching from RS256 to HS256), weak secret brute-forcing, and injection attacks through header parameters like 'kid' and 'jku'. The guide covers exploitation techniques for each vulnerability type, from trivial signature removal to sophisticated ECDSA psychic signature attacks. Key defense strategies include strict algorithm validation, secure key management, input sanitization, and proper signature verification implementation.

โ€ข13m read timeโ€ขFrom pentesterlab.com
Post cover image
Table of contents
๐Ÿงช JSON Web Algorithms (JWA)๐Ÿ”„ One Website, Many JWT Implementations๐Ÿ”“ 1. Signature Not VerifiedโŒ 2. None Algorithm Attack๐Ÿง‚ 3. Trivial Secret (Weak HMAC Keys)๐Ÿ”€ 4. Algorithm Confusion (RSA to HMAC)๐Ÿ”€ 4b. Algorithm Confusion (ECDSA to HMAC)๐Ÿชค 5. kid Injection (Key ID Manipulation)๐Ÿงฌ 6. Embedded JWK (CVE-2018-0114)๐ŸŒ 7. JKU / X5U Header Abuse๐Ÿง™ 8. CVE-2022-21449 (Psychic Signature)๐Ÿ“š Final Thoughts: Mastering JWT Security
1 Comment

Sort: