json-jwt 0.1.8

2 security vulnerabilities found in version 0.1.8

json-jwt improper input validation due to lack of element count when splitting string

high severity CVE-2019-18848
high severity CVE-2019-18848
Patched versions: >= 1.11.0

The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.

json-jwt allows bypass of identity checks via a sign/encryption confusion attack

medium severity CVE-2023-51774
medium severity CVE-2023-51774
Patched versions: ~> 1.15.3, >= 1.15.3.1, >= 1.16.6

The json-jwt (aka JSON::JWT) gem versions 1.16.5 and below sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.