#VU69935 Improper Verification of Cryptographic Signature in pac4j - CVE-2021-44878
Published: December 6, 2022
pac4j
pac4j
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists if an OpenID Connect provider supports the "none" algorithm, then pac4j does not refuse it without an explicit configuration on its side or for the "idtoken" response type. A remote attacker can bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.