Skip to content

oidc: verify the ID Token's signature before processing claims #464

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 30, 2025

Conversation

ericchiang
Copy link
Collaborator

This change updates the verification logic of this library to first validate the ID Token instead of parsing claims. This hopefully makes it harder for a malicious client to provide an invalid token for validation that's crafted to cause this package to over-allocate memory. See the associated bug and CVE-2025-27144.

Fixes #463

This change updates the verification logic of this library to first
validate the ID Token instead of parsing claims. This hopefully makes it
harder for a malicious client to provide an invalid token for validation
that's crafted to cause this package to over-allocate memory. See the
associated bug and CVE-2025-27144.

Fixes coreos#463
@ericchiang ericchiang merged commit 8d1e57e into coreos:v3 Jul 30, 2025
2 checks passed
@ericchiang ericchiang deleted the verify-first branch July 30, 2025 04:50
@SuperSandro2000
Copy link

Can you publish an advisory at https://github.com/coreos/go-oidc/security ?

ericchiang added a commit to ericchiang/go-oidc that referenced this pull request Aug 2, 2025
This change updates the verification logic of this library to always
verify the signature of the token before validating the payload. See
associated issue.

coreos#464
ericchiang added a commit to ericchiang/go-oidc that referenced this pull request Aug 2, 2025
This change updates the verification logic of this library to always
verify the signature of the token before validating the payload. See
associated issue.

coreos#464
ericchiang added a commit that referenced this pull request Aug 2, 2025
This change updates the verification logic of this library to always
verify the signature of the token before validating the payload. See
associated issue.

#464
atoulme pushed a commit to open-telemetry/opentelemetry-collector-contrib that referenced this pull request Aug 6, 2025
…41694)

<!--Ex. Fixing a bug - Describe the bug and how this fixes the issue.
Ex. Adding a feature - Explain what this achieves.-->
#### Description

- Upgrades go-oidc to include [this
](coreos/go-oidc#464
- Removes the custom JWT parsing code and replaces it with an equivalent
function from go-jose.

<!-- Issue number (e.g. #1234) or full URL to issue, if applicable. -->
#### Link to tracking issue
Fixes #41556.

<!--Describe what testing was performed and which tests were added.-->
#### Testing

I'm relying on existing unit tests.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants