Описание
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
Ссылки
- Patch
- ExploitVendor Advisory
- Patch
- ExploitVendor Advisory
- Third Party AdvisoryMailing List
- ExploitPress/Media CoverageTechnical Description
Уязвимые конфигурации
EPSS
6.8 Medium
CVSS3
Дефекты
Связанные уязвимости
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ...
JWCrypto vulnerable to JWT bomb Attack in `deserialize` function
EPSS
6.8 Medium
CVSS3