Closed
Description
i got this warning this morning
thanks
# npm audit report
jsonwebtoken <=8.5.1
Severity: high
jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC - https://github.com/advisories/GHSA-hjrf-2m68-5959
jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify() - https://github.com/advisories/GHSA-qwph-4952-7xr6
jsonwebtoken unrestricted key type could lead to legacy keys usage - https://github.com/advisories/GHSA-8cf7-32gw-wr33
jsonwebtoken has insecure input validation in jwt.verify function - https://github.com/advisories/GHSA-27h2-hvpr-p74q
No fix available
node_modules/ibm-cloud-sdk-core/node_modules/jsonwebtoken
ibm-cloud-sdk-core >=0.3.0
Depends on vulnerable versions of jsonwebtoken
node_modules/ibm-cloud-sdk-core
@ibm-cloud/cloudant *
Depends on vulnerable versions of ibm-cloud-sdk-core
node_modules/@ibm-cloud/cloudant
Metadata
Metadata
Assignees
Labels
No labels