Description
reason-jose is a JOSE implementation in ReasonML and OCaml.`Jose.Jws.validate` does not check HS256 signatures. This allows tampering of JWS header and payload data if the service does not perform additional checks. Such tampering could expose applications using reason-jose to authorization bypass. Applications relying on JWS claims assertion to enforce security boundaries may be vulnerable to privilege escalation. This issue has been patched in version 0.8.2.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/ulrikstrid/reason-jose/security/advisories/GHSA-7jj9-6qwv-wpm7
Patch, Third Party Advisory x_refsource_misc
https://github.com/ulrikstrid/reason-jose/commit/36cd724db3cbec121757624da49072386bd869e5
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/ulrikstrid/reason-jose/releases/tag/v0.8.2
Scores
CVSS v3
5.9
EPSS
0.0016
EPSS Percentile
37.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-347
Status
published
Products (1)
reason-jose_project/reason-jose
< 0.8.2
Published
Feb 01, 2023
Tracked Since
Feb 18, 2026