{"id":"CVE-2024-33531","details":"cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks by crafting a JWT with an enc header with the value A256GCM.","modified":"2026-03-14T12:33:25.572385Z","published":"2024-04-24T06:15:14.210Z","references":[{"type":"WEB","url":"https://insinuator.net/2023/10/lua-resty-jwt-authentication-bypass/"},{"type":"REPORT","url":"https://github.com/cdbattags/lua-resty-jwt/issues/61"},{"type":"FIX","url":"https://github.com/cdbattags/lua-resty-jwt/commit/d1558e2afefe868fea1e7e9a4b04ea94ab678a85"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cdbattags/lua-resty-jwt","events":[{"introduced":"0"},{"fixed":"d1558e2afefe868fea1e7e9a4b04ea94ab678a85"}]},{"type":"GIT","repo":"https://github.com/cdbattags/lua-resty-jwt","events":[{"introduced":"0"},{"fixed":"d1558e2afefe868fea1e7e9a4b04ea94ab678a85"}]}],"versions":["v0.1.1","v0.1.10","v0.1.11","v0.1.2","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.1.9","v0.2.0","v0.2.1","v0.2.2","v0.2.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-33531.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}