Skip to content

[Add] RS256 - HS256 Type Mismatch Attack #2

@sadkris

Description

@sadkris

Hey, wanted to just suggest an addition to this project of implementing the algorithm confusion attack as detailed here. Essentially, given any two JWT hashes signed with RS256, you can derive the public key that was used to sign them. Based on that, if the code isn't verifying the set algorithm, you can arbitrarily sign your keys as HS256 by using the public key as the secret since that's what would be used as a key for verification of signatures.

Secondarily, I would prefer that bruteforce processes would be run from an internal instanced docker container when requested, as the current system isn't efficient enough to provide consistent results as opposed to using something such as gojwtcrack, or just hashcat.

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions