Quick JWT Security Challenge - Can You Spot the Risk?

x32x01
  • by x32x01 ||
While testing a web app, you find an endpoint that accepts a JWT in the Authorization header.
The server verifies tokens but does not enforce the alg value from a trusted list, and you notice a token signed with alg: "HS256".
You try changing the token header to alg: "none", and the server accepts it.

What’s the most serious impact an attacker could achieve from this vulnerability?

Options

  1. Steal users’ plain-text passwords from the database
  2. Forge tokens to impersonate an admin account and gain full app access
  3. Trigger server-side Remote Code Execution (RCE) immediately
  4. Cause a Denial of Service (DoS) by flooding token verification requests

Comment your answer below 👇
 
Last edited:

Related Threads

x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
x32x01
Replies
0
Views
557
x32x01
x32x01
x32x01
Replies
0
Views
2K
x32x01
x32x01
x32x01
Replies
0
Views
1K
x32x01
x32x01
TAGs: Tags
api security authentication bypass broken authentication cybersecurity challenge json web token jwt security owasp top 10 secure coding token forgery web application security
Register & Login Faster
Forgot your password?

Latest Resources

Forum Statistics
Threads
745
Messages
750
Members
71
Latest Member
Mariaunmax
Back
Top