{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:57:20.478","vulnerabilities":[{"cve":{"id":"CVE-2021-32631","sourceIdentifier":"security-advisories@github.com","published":"2021-07-26T16:15:07.637","lastModified":"2024-11-21T06:07:25.110","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Common is a package of common modules that can be accessed by NIMBLE services. Common before commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 did not properly verify the signature of JSON Web Tokens. This allows someone to forge a valid JWT. Being able to forge JWTs may lead to authentication bypasses. Commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 contains a patch for the issue. As a workaround, one may use the parseClaimsJws method to correctly verify the signature of a JWT."},{"lang":"es","value":"Common es un paquete de módulos comunes al que se puede acceder por los servicios de NIMBLE. Common anterior al commit número 3b96cb0293d3443b870351945f41d7d55cb34b53 no verificaba apropiadamente la firma de los Tokens Web JSON. Esto permite que alguien falsifique un JWT válido. La posibilidad de falsificar JWTs puede conllevar a omisiones de autenticación. El commit número 3b96cb0293d3443b870351945f41d7d55cb34b53 contiene un parche para el problema. Como solución, se puede usar el método parseClaimsJws para verificar correctamente la firma de un JWT"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-290"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nimble-project:common:-:*:*:*:*:*:*:*","matchCriteriaId":"89249F6B-9A11-475A-9B1E-44F9FD150295"}]}]}],"references":[{"url":"https://github.com/nimble-platform/common/commit/12197a755bd524559bf4e16475595a2c6fcd34db","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/commit/3b96cb0293d3443b870351945f41d7d55cb34b53","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/commit/a59ad46733912a5580530e39cac0e6ebc83cc563","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/security/advisories/GHSA-fjq8-896w-pv28","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/commit/12197a755bd524559bf4e16475595a2c6fcd34db","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/commit/3b96cb0293d3443b870351945f41d7d55cb34b53","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/commit/a59ad46733912a5580530e39cac0e6ebc83cc563","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/nimble-platform/common/security/advisories/GHSA-fjq8-896w-pv28","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}