Analysis of typical vulnerabilities when using JSON Web Token (JWT) in authentication systems

Бесплатный доступ

The article discusses typical vulnerabilities that arise when using JSON Web Token (JWT) in authentication systems. The causes of such vulnerabilities are analyzed, including configuration errors, incorrect signature verification, improper storage of tokens, and the use of outdated libraries. Particular attention is paid to practical attack scenarios, as well as methods for preventing them. Recommendations for the secure implementation of JWT and maintaining the system's resistance to external influences are provided.

Jwt, alg none, rs256, hs256, xss, replay-атака

Короткий адрес: https://sciup.org/170211236

IDR: 170211236   |   DOI: 10.24412/2500-1000-2025-9-1-176-180