POC详情: 7ac649e15f8f7d73af5e55f873f617cd47564024

来源
关联漏洞
标题: jwt-simple 安全漏洞 (CVE-2016-10555)
描述:jwt-simple是一个基于Node.js的JWT(JSON Web Token)编码和解码模块。 jwt-simple 0.3.0及之前版本中存在安全漏洞。攻击者可通过选择发送到的服务器的算法利用该漏洞伪造任意数据。
描述
Exploiting the CVE-2016-10555
介绍
# jwtToken-CVE-2016-10555
Exploiting the CVE-2016-10555

Tried to use the jwt_tool located here but ran into some issues: https://github.com/ticarpi/jwt_tool

The code uploaded was taken from the above to accomplish what I needed.

---

Was working with Mutillidae and needed to manipulate the JWT token.  Created the jwtMutillidae.py to conduct the UserID manipulation...
文件快照

[4.0K] /data/pocs/7ac649e15f8f7d73af5e55f873f617cd47564024 ├── [5.6K] cve.py ├── [3.4K] jwtMutillidae.py ├── [1.0K] LICENSE └── [ 373] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。