Home » Vulnerabilities Knowledge Base » JWT token is found to be using weak encryption key i.e. HMAC
JSON Web Tokens (JWT) are commonly used for securely transmitting information between parties as a JSON object. However, when JWTs are signed using HMAC (Hash-based Message Authentication Code) with a weak or hardcoded secret key, they become vulnerable to brute-force or dictionary attacks.
An attacker can exploit this by:
HMAC, when used with weak keys or poor key management, fails to provide the cryptographic integrity that JWTs are supposed to guarantee.
An attacker can generate valid JWTs and gain unauthorized access to protected resources.
Attackers can impersonate admin accounts or bypass role-based controls.
Sensitive endpoints may be exposed to unauthorized parties.
In severe cases, system-level compromise can occur due to trust placed on the JWT.
This compromises authentication, authorization and session integrity of the application.
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...