Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-29371

Опубликовано: 17 дек. 2025
Источник: debian
EPSS Низкий

Описание

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libjose4j-javafixed0.9.6-1package

Примечания

  • https://bitbucket.org/b_c/jose4j/issues/220/vuln-zip-bomb-attack

  • Fixed by: https://bitbucket.org/b_c/jose4j/commits/19a90a64c47bb07c4aa5462f1316d5c293d81fcf

EPSS

Процентиль: 15%
0.00049
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

CVSS3: 7.5
nvd
около 2 месяцев назад

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

CVSS3: 7.5
github
около 2 месяцев назад

jose4j is vulnerable to DoS via compressed JWE content

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость JWT-библиотеки Jose4j, связанная с неправильной защитой токенов безопасности, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
redos
13 дней назад

Уязвимость apache-kafka

EPSS

Процентиль: 15%
0.00049
Низкий