Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-28102

Опубликовано: 21 мар. 2024
Источник: debian
EPSS Низкий

Описание

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-jwcryptofixed1.5.6-1package
python-jwcryptofixed1.1.0-1+deb12u1bookwormpackage

Примечания

  • https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97

  • https://github.com/latchset/jwcrypto/commit/90477a3b6e73da69740e00b8161f53fea19b831f (v1.5.6)

EPSS

Процентиль: 29%
0.00103
Низкий

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVSS3: 6.8
redhat
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVSS3: 6.8
nvd
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

rocky
около 1 года назад

Moderate: python-jwcrypto security update

CVSS3: 6.8
github
больше 1 года назад

JWCrypto vulnerable to JWT bomb Attack in `deserialize` function

EPSS

Процентиль: 29%
0.00103
Низкий