We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
大佬,看你这个项目调用了github.com/dgrijalva/jwt-go等185个开源组件,存在6个安全漏洞,建议你升级下。
漏洞标题:jwt-go 安全漏洞 漏洞编号:CVE-2020-26160 漏洞描述: jwt-go是个人开发者的一个Go语言的JWT实现。 jwt-go 4.0.0-preview1之前版本存在安全漏洞。攻击者可利用该漏洞在使用[]string{} for m[\"aud\"](规范允许)的情况下绕过预期的访问限制。 影响范围:(∞, 4.0.0-preview1) 最小修复版本:4.0.0-preview1 引入路径: github.com/micro-plat/hydra@->github.com/micro-plat/[email protected]>github.com/dgrijalva/[email protected]+incompatible
另外5个漏洞 ,信息有点多我就不贴了,你自己看下完整报告:https://www.mfsec.cn/jr?p=ac69c4 你对这个issues有任何疑问可以回复我,我能看见哈。
The text was updated successfully, but these errors were encountered:
感谢反馈,近期安排升级
https://www.mfsec.cn/jr?p=ac69c4 无法访问呢
Sorry, something went wrong.
No branches or pull requests
大佬,看你这个项目调用了github.com/dgrijalva/jwt-go等185个开源组件,存在6个安全漏洞,建议你升级下。
另外5个漏洞 ,信息有点多我就不贴了,你自己看下完整报告:https://www.mfsec.cn/jr?p=ac69c4
你对这个issues有任何疑问可以回复我,我能看见哈。
The text was updated successfully, but these errors were encountered: