Vulnerability case: The application doesn’t properly check which X5C key is used for signing and when X5C headers are set to our values and signed with our private key, authentication is bypassed.
Lab: https://brokencrystals.com
Edit JWT: https://jwt.io
simple JSON Web Key generator: https://mkjwk.org