| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g962-2j28-3cg9 | OliveTin has JWT Audience Validation Bypass in Local Key and HMAC Modes |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Olivetin
Olivetin olivetin |
|
| Vendors & Products |
Olivetin
Olivetin olivetin |
Fri, 06 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured audience value (authJwtAud) is not enforced during token parsing. As a result, validly signed JWT tokens with an incorrect aud claim are accepted for authentication. This allows authentication using tokens intended for a different audience/service. This issue has been patched in version 3000.11.1. | |
| Title | OliveTin: JWT Audience Validation Bypass in Local Key and HMAC Modes | |
| Weaknesses | CWE-287 CWE-345 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T20:54:29.764Z
Reserved: 2026-03-04T17:23:59.797Z
Link: CVE-2026-30223
Updated: 2026-03-09T20:51:36.420Z
Status : Awaiting Analysis
Published: 2026-03-06T21:16:16.113
Modified: 2026-03-09T13:35:34.633
Link: CVE-2026-30223
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:06:55Z
Github GHSA