Skip to content

Commit 9cbbbe7

Browse files
authored
Merge branch 'master' into 235-Java8_time_formats
2 parents 59196a7 + 5812f63 commit 9cbbbe7

20 files changed

+289
-94
lines changed

CHANGELOG.md

+10
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
## Release Notes
22

3+
### 0.12.6
4+
5+
This patch release:
6+
7+
* Ensures that after successful JWS signature verification, an application-configured Base64Url `Decoder` output is
8+
used to construct a `Jws` instance (instead of JJWT's default decoder). See
9+
[Issue 947](https://github.com/jwtk/jjwt/issues/947).
10+
* Fixes a decompression memory leak in concurrent/multi-threaded environments introduced in 0.12.0 when decompressing JWTs with a `zip` header of `GZIP`. See [Issue 949](https://github.com/jwtk/jjwt/issues/949).
11+
* Upgrades BouncyCastle to 1.78 via [PR 941](https://github.com/jwtk/jjwt/pull/941).
12+
313
### 0.12.5
414

515
This patch release:

README.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:doctype: book
22
= Java JWT: JSON Web Token for Java and Android
3-
:project-version: 0.12.5
3+
:project-version: 0.12.6
44
:toc:
55
:toc-title:
66
:toc-placement!:

SECURITY.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ We ask that all users or security researchers upgrade to the latest stable relea
1111

1212
| Version | Supported |
1313
| -------- | ------------------ |
14-
| 0.11.x | :white_check_mark: |
15-
| < 0.11.0 | :x: |
14+
| 0.12.x | :white_check_mark: |
15+
| < 0.12.0 | :x: |
1616

1717
## Reporting Security Issues
1818

api/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../pom.xml</relativePath>
2626
</parent>
2727

extensions/gson/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../../pom.xml</relativePath>
2626
</parent>
2727

extensions/jackson/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../../pom.xml</relativePath>
2626
</parent>
2727

extensions/orgjson/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../../pom.xml</relativePath>
2626
</parent>
2727

extensions/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../pom.xml</relativePath>
2626
</parent>
2727

impl/pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
<parent>
2222
<groupId>io.jsonwebtoken</groupId>
2323
<artifactId>jjwt-root</artifactId>
24-
<version>1.0.0-SNAPSHOT</version>
24+
<version>0.12.7-SNAPSHOT</version>
2525
<relativePath>../pom.xml</relativePath>
2626
</parent>
2727

impl/src/main/java/io/jsonwebtoken/impl/DefaultJws.java

+3-4
Original file line numberDiff line numberDiff line change
@@ -18,17 +18,16 @@
1818
import io.jsonwebtoken.Jws;
1919
import io.jsonwebtoken.JwsHeader;
2020
import io.jsonwebtoken.JwtVisitor;
21-
import io.jsonwebtoken.io.Decoders;
2221

2322
public class DefaultJws<P> extends DefaultProtectedJwt<JwsHeader, P> implements Jws<P> {
2423

2524
private static final String DIGEST_NAME = "signature";
2625

2726
private final String signature;
2827

29-
public DefaultJws(JwsHeader header, P payload, String signature) {
30-
super(header, payload, Decoders.BASE64URL.decode(signature), DIGEST_NAME);
31-
this.signature = signature;
28+
public DefaultJws(JwsHeader header, P payload, byte[] signature, String b64UrlSig) {
29+
super(header, payload, signature, DIGEST_NAME);
30+
this.signature = b64UrlSig;
3231
}
3332

3433
@Override

impl/src/main/java/io/jsonwebtoken/impl/DefaultJwtBuilder.java

+14-16
Original file line numberDiff line numberDiff line change
@@ -617,14 +617,8 @@ private String sign(final Payload payload, final Key key, final Provider provide
617617

618618
// Next, b64 extension requires the raw (non-encoded) payload to be included directly in the signing input,
619619
// so we ensure we have an input stream for that:
620-
if (payload.isClaims() || payload.isCompressed()) {
621-
ByteArrayOutputStream claimsOut = new ByteArrayOutputStream(8192);
622-
writeAndClose("JWS Unencoded Payload", payload, claimsOut);
623-
payloadStream = Streams.of(claimsOut.toByteArray());
624-
} else {
625-
// No claims and not compressed, so just get the direct InputStream:
626-
payloadStream = Assert.stateNotNull(payload.toInputStream(), "Payload InputStream cannot be null.");
627-
}
620+
payloadStream = toInputStream("JWS Unencoded Payload", payload);
621+
628622
if (!payload.isClaims()) {
629623
payloadStream = new CountingInputStream(payloadStream); // we'll need to assert if it's empty later
630624
}
@@ -712,14 +706,7 @@ private String encrypt(final Payload content, final Key key, final Provider keyP
712706
Assert.stateNotNull(keyAlgFunction, "KeyAlgorithm function cannot be null.");
713707
assertPayloadEncoding("JWE");
714708

715-
InputStream plaintext;
716-
if (content.isClaims()) {
717-
ByteArrayOutputStream out = new ByteArrayOutputStream(4096);
718-
writeAndClose("JWE Claims", content, out);
719-
plaintext = Streams.of(out.toByteArray());
720-
} else {
721-
plaintext = content.toInputStream();
722-
}
709+
InputStream plaintext = toInputStream("JWE Payload", content);
723710

724711
//only expose (mutable) JweHeader functionality to KeyAlgorithm instances, not the full headerBuilder
725712
// (which exposes this JwtBuilder and shouldn't be referenced by KeyAlgorithms):
@@ -839,4 +826,15 @@ private void encodeAndWrite(String name, byte[] data, OutputStream out) {
839826
Streams.writeAndClose(out, data, "Unable to write bytes");
840827
}
841828

829+
private InputStream toInputStream(final String name, Payload payload) {
830+
if (payload.isClaims() || payload.isCompressed()) {
831+
ByteArrayOutputStream claimsOut = new ByteArrayOutputStream(8192);
832+
writeAndClose(name, payload, claimsOut);
833+
return Streams.of(claimsOut.toByteArray());
834+
} else {
835+
// No claims and not compressed, so just get the direct InputStream:
836+
return Assert.stateNotNull(payload.toInputStream(), "Payload InputStream cannot be null.");
837+
}
838+
}
839+
842840
}

impl/src/main/java/io/jsonwebtoken/impl/DefaultJwtParser.java

+59-50
Original file line numberDiff line numberDiff line change
@@ -266,8 +266,8 @@ private static boolean hasContentType(Header header) {
266266
return header != null && Strings.hasText(header.getContentType());
267267
}
268268

269-
private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHeader, final String alg,
270-
@SuppressWarnings("deprecation") SigningKeyResolver resolver, Claims claims, Payload payload) {
269+
private byte[] verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHeader, final String alg,
270+
@SuppressWarnings("deprecation") SigningKeyResolver resolver, Claims claims, Payload payload) {
271271

272272
Assert.notNull(resolver, "SigningKeyResolver instance cannot be null.");
273273

@@ -355,6 +355,8 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
355355
} finally {
356356
Streams.reset(payloadStream);
357357
}
358+
359+
return signature;
358360
}
359361

360362
@Override
@@ -486,7 +488,7 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
486488
}
487489

488490
byte[] iv = null;
489-
byte[] tag = null;
491+
byte[] digest = null; // either JWE AEAD tag or JWS signature after Base64Url-decoding
490492
if (tokenized instanceof TokenizedJwe) {
491493

492494
TokenizedJwe tokenizedJwe = (TokenizedJwe) tokenized;
@@ -522,8 +524,8 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
522524
base64Url = base64UrlDigest;
523525
//guaranteed to be non-empty via the `alg` + digest check above:
524526
Assert.hasText(base64Url, "JWE AAD Authentication Tag cannot be null or empty.");
525-
tag = decode(base64Url, "JWE AAD Authentication Tag");
526-
if (Bytes.isEmpty(tag)) {
527+
digest = decode(base64Url, "JWE AAD Authentication Tag");
528+
if (Bytes.isEmpty(digest)) {
527529
String msg = "Compact JWE strings must always contain an AAD Authentication Tag.";
528530
throw new MalformedJwtException(msg);
529531
}
@@ -565,7 +567,7 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
565567
// TODO: add encProvider(Provider) builder method that applies to this request only?
566568
InputStream ciphertext = payload.toInputStream();
567569
ByteArrayOutputStream plaintext = new ByteArrayOutputStream(8192);
568-
DecryptAeadRequest dreq = new DefaultDecryptAeadRequest(ciphertext, cek, aad, iv, tag);
570+
DecryptAeadRequest dreq = new DefaultDecryptAeadRequest(ciphertext, cek, aad, iv, digest);
569571
encAlg.decrypt(dreq, plaintext);
570572
payload = new Payload(plaintext.toByteArray(), header.getContentType());
571573

@@ -575,7 +577,7 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
575577
// not using a signing key resolver, so we can verify the signature before reading the payload, which is
576578
// always safer:
577579
JwsHeader jwsHeader = Assert.stateIsInstance(JwsHeader.class, header, "Not a JwsHeader. ");
578-
verifySignature(tokenized, jwsHeader, alg, new LocatingKeyResolver(this.keyLocator), null, payload);
580+
digest = verifySignature(tokenized, jwsHeader, alg, new LocatingKeyResolver(this.keyLocator), null, payload);
579581
integrityVerified = true; // no exception means signature verified
580582
}
581583

@@ -596,66 +598,73 @@ private void verifySignature(final TokenizedJwt tokenized, final JwsHeader jwsHe
596598
Claims claims = null;
597599
byte[] payloadBytes = payload.getBytes();
598600
if (payload.isConsumable()) {
599-
600-
InputStream in = payload.toInputStream();
601-
602-
if (!hasContentType(header)) { // If there is a content type set, then the application using JJWT is expected
603-
// to convert the byte payload themselves based on this content type
604-
// https://www.rfc-editor.org/rfc/rfc7515.html#section-4.1.10 :
605-
//
606-
// "This parameter is ignored by JWS implementations; any processing of this
607-
// parameter is performed by the JWS application."
608-
//
609-
Map<String, ?> claimsMap = null;
610-
try {
611-
// if deserialization fails, we'll need to rewind to convert to a byte array. So if
612-
// mark/reset isn't possible, we'll need to buffer:
613-
if (!in.markSupported()) {
614-
in = new BufferedInputStream(in);
615-
in.mark(0);
616-
}
617-
claimsMap = deserialize(new UncloseableInputStream(in) /* Don't close in case we need to rewind */, "claims");
618-
} catch (DeserializationException | MalformedJwtException ignored) { // not JSON, treat it as a byte[]
601+
InputStream in = null;
602+
try {
603+
in = payload.toInputStream();
604+
605+
if (!hasContentType(header)) { // If there is a content type set, then the application using JJWT is expected
606+
// to convert the byte payload themselves based on this content type
607+
// https://www.rfc-editor.org/rfc/rfc7515.html#section-4.1.10 :
608+
//
609+
// "This parameter is ignored by JWS implementations; any processing of this
610+
// parameter is performed by the JWS application."
611+
//
612+
Map<String, ?> claimsMap = null;
613+
try {
614+
// if deserialization fails, we'll need to rewind to convert to a byte array. So if
615+
// mark/reset isn't possible, we'll need to buffer:
616+
if (!in.markSupported()) {
617+
in = new BufferedInputStream(in);
618+
in.mark(0);
619+
}
620+
claimsMap = deserialize(new UncloseableInputStream(in) /* Don't close in case we need to rewind */, "claims");
621+
} catch (DeserializationException |
622+
MalformedJwtException ignored) { // not JSON, treat it as a byte[]
619623
// String msg = "Invalid claims: " + e.getMessage();
620624
// throw new MalformedJwtException(msg, e);
621-
} finally {
622-
Streams.reset(in);
623-
}
624-
if (claimsMap != null) {
625-
try {
626-
claims = new DefaultClaims(claimsMap);
627-
} catch (Throwable t) {
628-
String msg = "Invalid claims: " + t.getMessage();
629-
throw new MalformedJwtException(msg);
625+
} finally {
626+
Streams.reset(in);
627+
}
628+
if (claimsMap != null) {
629+
try {
630+
claims = new DefaultClaims(claimsMap);
631+
} catch (Throwable t) {
632+
String msg = "Invalid claims: " + t.getMessage();
633+
throw new MalformedJwtException(msg);
634+
}
630635
}
631636
}
632-
}
633-
if (claims == null) {
634-
// consumable, but not claims, so convert to byte array:
635-
payloadBytes = Streams.bytes(in, "Unable to convert payload to byte array.");
637+
if (claims == null) {
638+
// consumable, but not claims, so convert to byte array:
639+
payloadBytes = Streams.bytes(in, "Unable to convert payload to byte array.");
640+
}
641+
} finally { // always ensure closed per https://github.com/jwtk/jjwt/issues/949
642+
Objects.nullSafeClose(in);
636643
}
637644
}
638645

646+
// =============== Post-SKR Signature Check =================
647+
if (hasDigest && signingKeyResolver != null) { // TODO: remove for 1.0
648+
// A SigningKeyResolver has been configured, and due to it's API, we have to verify the signature after
649+
// parsing the body. This can be a security risk, so it needs to be removed before 1.0
650+
JwsHeader jwsHeader = Assert.stateIsInstance(JwsHeader.class, header, "Not a JwsHeader. ");
651+
digest = verifySignature(tokenized, jwsHeader, alg, this.signingKeyResolver, claims, payload);
652+
//noinspection UnusedAssignment
653+
integrityVerified = true; // no exception means verified successfully
654+
}
655+
639656
Jwt<?, ?> jwt;
640657
Object body = claims != null ? claims : payloadBytes;
641658
if (header instanceof JweHeader) {
642-
jwt = new DefaultJwe<>((JweHeader) header, body, iv, tag);
659+
jwt = new DefaultJwe<>((JweHeader) header, body, iv, digest);
643660
} else if (hasDigest) {
644661
JwsHeader jwsHeader = Assert.isInstanceOf(JwsHeader.class, header, "JwsHeader required.");
645-
jwt = new DefaultJws<>(jwsHeader, body, base64UrlDigest.toString());
662+
jwt = new DefaultJws<>(jwsHeader, body, digest, base64UrlDigest.toString());
646663
} else {
647664
//noinspection rawtypes
648665
jwt = new DefaultJwt(header, body);
649666
}
650667

651-
// =============== Signature =================
652-
if (hasDigest && signingKeyResolver != null) { // TODO: remove for 1.0
653-
// A SigningKeyResolver has been configured, and due to it's API, we have to verify the signature after
654-
// parsing the body. This can be a security risk, so it needs to be removed before 1.0
655-
JwsHeader jwsHeader = Assert.stateIsInstance(JwsHeader.class, header, "Not a JwsHeader. ");
656-
verifySignature(tokenized, jwsHeader, alg, this.signingKeyResolver, claims, payload);
657-
}
658-
659668
final boolean allowSkew = this.allowedClockSkewMillis > 0;
660669

661670
//since 0.3:

impl/src/main/java/io/jsonwebtoken/impl/security/DefaultMacAlgorithm.java

+4-4
Original file line numberDiff line numberDiff line change
@@ -135,12 +135,12 @@ private void assertAlgorithmName(SecretKey key, boolean signing) {
135135
throw new InvalidKeyException(msg);
136136
}
137137

138-
// We can ignore PKCS11 key name assertions because HSM module key algorithm names don't always align with
139-
// JCA standard algorithm names:
140-
boolean pkcs11Key = KeysBridge.isSunPkcs11GenericSecret(key);
138+
// We can ignore key name assertions for generic secrets, because HSM module key algorithm names
139+
// don't always align with JCA standard algorithm names
140+
boolean generic = KeysBridge.isGenericSecret(key);
141141

142142
//assert key's jca name is valid if it's a JWA standard algorithm:
143-
if (!pkcs11Key && isJwaStandard() && !isJwaStandardJcaName(name)) {
143+
if (!generic && isJwaStandard() && !isJwaStandardJcaName(name)) {
144144
throw new InvalidKeyException("The " + keyType(signing) + " key's algorithm '" + name +
145145
"' does not equal a valid HmacSHA* algorithm name or PKCS12 OID and cannot be used with " +
146146
getId() + ".");

impl/src/main/java/io/jsonwebtoken/impl/security/KeysBridge.java

+10-6
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,9 @@
3434
@SuppressWarnings({"unused"}) // reflection bridge class for the io.jsonwebtoken.security.Keys implementation
3535
public final class KeysBridge {
3636

37-
private static final String SUNPKCS11_GENERIC_SECRET_CLASSNAME = "sun.security.pkcs11.P11Key$P11SecretKey";
38-
private static final String SUNPKCS11_GENERIC_SECRET_ALGNAME = "Generic Secret"; // https://github.com/openjdk/jdk/blob/4f90abaf17716493bad740dcef76d49f16d69379/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11KeyStore.java#L1292
37+
// Some HSMs use generic secrets. This prefix matches the generic secret algorithm name
38+
// used by SUN PKCS#11 provider, AWS CloudHSM JCE provider and possibly other HSMs
39+
private static final String GENERIC_SECRET_ALG_PREFIX = "Generic";
3940

4041
// prevent instantiation
4142
private KeysBridge() {
@@ -95,10 +96,13 @@ public static byte[] findEncoded(Key key) {
9596
return encoded;
9697
}
9798

98-
public static boolean isSunPkcs11GenericSecret(Key key) {
99-
return key instanceof SecretKey &&
100-
key.getClass().getName().equals(SUNPKCS11_GENERIC_SECRET_CLASSNAME) &&
101-
SUNPKCS11_GENERIC_SECRET_ALGNAME.equals(key.getAlgorithm());
99+
public static boolean isGenericSecret(Key key) {
100+
if (!(key instanceof SecretKey)) {
101+
return false;
102+
}
103+
104+
String algName = Assert.hasText(key.getAlgorithm(), "Key algorithm cannot be null or empty.");
105+
return algName.startsWith(GENERIC_SECRET_ALG_PREFIX);
102106
}
103107

104108
/**

0 commit comments

Comments
 (0)