Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-28102

Опубликовано: 08 мар. 2024
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

An uncontrolled resource consumption vulnerability was found in python-jwcrypto. If a malicious JWE token with a high compression ratio is passed to the server, the server will consume a lot of memory and processing time, leading to a denial of service.

Отчет

The CVE-2024-28102 vulnerability in JWCrypto represents a moderate severity issue due to its potential impact on system availability and resource consumption. While the vulnerability allows for a denial of service (DoS) attack, it requires an attacker to craft a malicious JWE Token with a high compression ratio. This specific condition limits the practical exploitability of the vulnerability to some extent, as it demands a more sophisticated attack approach than common vulnerabilities. Nonetheless, if exploited, the vulnerability can lead to significant memory exhaustion and increased server processing time, impacting the overall performance and availability of the affected system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7python-jwcryptoOut of support scope
Red Hat Ansible Automation Platform 2.4 for RHEL 8automation-controllerFixedRHSA-2024:452212.07.2024
Red Hat Ansible Automation Platform 2.4 for RHEL 9automation-controllerFixedRHSA-2024:452212.07.2024
Red Hat Enterprise Linux 8idmFixedRHSA-2024:326722.05.2024
Red Hat Enterprise Linux 8idmFixedRHSA-2024:326722.05.2024
Red Hat Enterprise Linux 9python-jwcryptoFixedRHSA-2024:255930.04.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2268758python-jwcrypto: malicious JWE token can cause denial of service

EPSS

Процентиль: 29%
0.00103
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVSS3: 6.8
nvd
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVSS3: 6.8
debian
больше 1 года назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ...

rocky
около 1 года назад

Moderate: python-jwcrypto security update

CVSS3: 6.8
github
больше 1 года назад

JWCrypto vulnerable to JWT bomb Attack in `deserialize` function

EPSS

Процентиль: 29%
0.00103
Низкий

6.8 Medium

CVSS3