apply suggestions from doc review

Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
This commit is contained in:
Erik Krogh Kristensen
2022-01-31 13:17:26 +01:00
committed by GitHub
parent 7b925604df
commit 8dcec2e037
2 changed files with 5 additions and 5 deletions

View File

@@ -2,12 +2,12 @@
<overview>
<p>
Applications decoding JSON Web Token (JWT) may be misconfigured due to the <code>None</code> algorithm.
Applications decoding JSON Web Tokens (JWT) may be misconfigured due to the <code>None</code> algorithm.
</p>
<p>
The <code>None</code> algorithm is selected by calling the <code>verify()</code> function with a falsy value
instead of a cryptographic secret or key. The <code>None</code> algorithm disables the integrity enforcement of
a JWT payload and may allow a malicious actor to make any desired changes to a JWT payload leading
a JWT payload and may allow a malicious actor to make unintended changes to a JWT payload leading
to critical security issues like privilege escalation.
</p>
@@ -21,8 +21,8 @@ Calls to <code>verify()</code> functions should use a cryptographic secret or ke
<example>
<p>
In the example below <code>false</code> is used to disable the integrity enforcement of a JWT payload.
This may allow a malicious actor to make any desired changes to a JWT payload.
In the example below, <code>false</code> is used to disable the integrity enforcement of a JWT payload.
This may allow a malicious actor to make changes to a JWT payload.
</p>
<sample src="examples/missing-key-verification-bad.js" />

View File

@@ -1,4 +1,4 @@
---
category: newQuery
---
* A new query `js/jwt-missing-verification` has been added. The query detects applications that does not verify JWT tokens.
* A new query `js/jwt-missing-verification` has been added. The query detects applications that don't verify JWT tokens.