File tree Expand file tree Collapse file tree 1 file changed +4
-7
lines changed
java/ql/src/experimental/Security/CWE/CWE-347 Expand file tree Collapse file tree 1 file changed +4
-7
lines changed Original file line number Diff line number Diff line change 22<qhelp >
33 <overview >
44 <p >
5- A JSON Web Token (JWT) is used for authenticating and managing users in an application.
6- </p >
7- <p >
8- Only Decoding JWTs without checking if they have a valid signature or not can lead to security vulnerabilities.
5+ A JSON Web Token (JWT) is used for authenticating and managing users in an application. It must be verified in order to ensure the JWT is genuine.
96 </p >
107
118 </overview >
129 <recommendation >
1310
1411 <p >
15- Don't use methods that only decode JWT, Instead use methods that verify the signature of JWT.
12+ Don't use information from a JWT without verifying that JWT.
1613 </p >
1714
1815 </recommendation >
1916 <example >
2017
2118 <p >
22- The following code you can see an Example from a popular Library .
19+ The following example illustrates secure and insecure use of the Auth0 `java-jwt` library .
2320 </p >
2421
2522 <sample src =" Example.java" />
3128 </li >
3229 </references >
3330
34- </qhelp >
31+ </qhelp >
You can’t perform that action at this time.
0 commit comments