top of page
perceptive_background_267k.jpg

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple pr…

Published:

30 maart 2026 om 22:00:00

Alert date:

31 maart 2026 om 04:03:55

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Supply Chain & Dependencies

SciTokens reference library prior to version 1.9.6 contains an authorization bypass vulnerability in the Enforcer component. The vulnerability stems from incorrect scope path validation using simple prefix matching with startswith function. This allows tokens with access to specific paths to also access sibling paths that share the same prefix, effectively bypassing intended authorization controls. For example, a token granted access to /john could also access /johnathan or /johnny paths. The issue has been addressed and patched in SciTokens version 1.9.6.

Technical details

Mitigation steps:

Affected products:

SciTokens

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page