Tags: ticarpi/jwt_tool
Tags
v2.2.1 [+] New scan test (re-signing of tokens with common passwords) in 'Playbook' scan mode (`-M pb`) [+] Added new hard-coded secret from CVE-2020-1764 to jwt-common.txt Bugfixes: * Replacing '%' in URL encoded targetUrl to avoid interpolation syntax errors
v2.2.0 [+] NEW exploit: blank password in signature (`-X b`) [+] NEW 'bare' mode: return only tokens to stdout - for using with upcoming integrations (`-b`) [+] additional checks in 'Playbook' scan mode (`-M pb`) [+] reordered help options to group similar options Bugfixes: * fixed Playbook scanner glitches * fixed config file generation issues
v2.1.0 [+] NEW exploit: null signature (`-X n`) [+] NEW scanner mode: Inject Common Claims (`-M cc`) [+] additional checks in 'Playbook' scan mode (`-M pb`) [+] multiple custom headers now supported (`-rh`) [+] reflective JWKS URL created automatically in config file - for JKU/Spoof JWKS attacks (`-X s`) [+] checks added for old/incompatible config files [+] report on long HTTP response times Bugfixes: * fixed colours not working in Windows cmd/Powershell * fixed capitalisation issue in config file * fixed broken null signed kid attacks in ScanModePlaybook()
v1.3.5 - improved reading of nested JSON in claims [+] Enabled reading of multiple-level nesting of JSON objects in claims (thanks @frani @fredsibcald @ASoggySandal) Fixed function names and text referencing 'key length' where it should have been 'hash length' (thanks @floyd-fuh)
PreviousNext