Analysis of typical vulnerabilities when using JSON Web Token (JWT) in authentication systems
Автор: Konovalov G.G., Zarbalieva N.O.K.
Журнал: Международный журнал гуманитарных и естественных наук @intjournal
Рубрика: Технические науки
Статья в выпуске: 9-1 (108), 2025 года.
Бесплатный доступ
The article discusses typical vulnerabilities that arise when using JSON Web Token (JWT) in authentication systems. The causes of such vulnerabilities are analyzed, including configuration errors, incorrect signature verification, improper storage of tokens, and the use of outdated libraries. Particular attention is paid to practical attack scenarios, as well as methods for preventing them. Recommendations for the secure implementation of JWT and maintaining the system's resistance to external influences are provided.
Jwt, alg none, rs256, hs256, xss, replay-атака
Короткий адрес: https://sciup.org/170211236
IDR: 170211236 | DOI: 10.24412/2500-1000-2025-9-1-176-180