You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using HMAC algorithms (HS256, HS384, HS512), python-jose and PyJWT exhibit different signature validation behavior compared to Node's jsonwebtoken library. Multiple valid signature endings are accepted when modifying the last character.
TLDR: We have a base64 malleability which could be problematic for revocation that relies on the whole jwt instead of jti.
The text was updated successfully, but these errors were encountered:
rb-x
changed the title
Multiple valid JWT Signatures for HMAC Algorithms
Multiple valid JWT Signatures for HMAC Algorithms (base64 malleability)
Dec 30, 2024
When using HMAC algorithms (HS256, HS384, HS512), python-jose and PyJWT exhibit different signature validation behavior compared to Node's jsonwebtoken library. Multiple valid signature endings are accepted when modifying the last character.
TLDR: We have a base64 malleability which could be problematic for revocation that relies on the whole jwt instead of jti.
Here's a minimal reproduction script:
NodeJS JWT
The text was updated successfully, but these errors were encountered: