Show plain JSON{"bugzilla": {"description": "3scale: claim restriction bypass via JWT algorithm switch", "id": "2062877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062877"}, "csaw": false, "cvss3": {"cvss3_base_score": "0.0", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", "status": "draft"}, "cwe": "CWE-290", "details": ["3scale's gateway usage of JWT does not properly handle verification of algorithm claims in the token header. An attacker could use this flaw to create a signed token with improper claims and thus to bypass security restrictions for the user."], "name": "CVE-2022-0931", "package_state": [{"cpe": "cpe:/a:redhat:red_hat_3scale_amp:2", "fix_state": "Not affected", "impact": "moderate", "package_name": "3scale-amp-gateway", "product_name": "Red Hat 3scale API Management Platform 2"}], "public_date": "2024-02-08T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2022-0931\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-0931"], "statement": "Red Hat Product Security does not consider this to be a vulnerability. Upstream has not acknowledged this issue as a security flaw."}