Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-29371

Опубликовано: 17 дек. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

A flaw was found in jose4j. A remote attacker can exploit this by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. This can lead to a Denial of Service, making the service unavailable to legitimate users.

Отчет

This vulnerability is rated Important as it can lead to a Denial of Service in applications that process untrusted JSON Web Encryption tokens. An attacker can craft a malicious JWE token with an exceptionally high compression ratio, causing excessive memory allocation and processing time during decompression in affected components like jose4j. This affects products such as Red Hat AMQ, Enterprise Application Platform (EAP 8.0.z, 8.1.z), Red Hat JBoss Fuse, JBoss Data Grid, OpenShift Developer Tools & Services, Red Hat build of Apache Camel, Red Hat Integration, Red Hat OpenShift Dev Spaces, Red Hat Process Automation Manager, Red Hat Single Sign-On (RH-SSO), Insights, cloud.redhat.com, and OpenShift Serverless.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and Servicesjenkins-2-pluginsAffected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel9Affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel9Affected
Red Hat build of Apache Camel for Spring Boot 4jose4jNot affected
Red Hat build of Apache Camel - HawtIO 4jose4jNot affected
Red Hat build of Apicurio Registry 2jose4jAffected
Red Hat build of Apicurio Registry 3jose4jAffected
Red Hat build of Debezium 2jose4jWill not fix
Red Hat build of Debezium 3jose4jWill not fix
Red Hat build of Quarkusjose4jNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-409
https://bugzilla.redhat.com/show_bug.cgi?id=2423194jose4j: jose4j: Denial of Service via malicious JSON Web Encryption (JWE) token compression

EPSS

Процентиль: 5%
0.00019
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
4 месяца назад

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

CVSS3: 7.5
nvd
4 месяца назад

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.

CVSS3: 7.5
debian
4 месяца назад

In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS ...

CVSS3: 7.5
github
4 месяца назад

jose4j is vulnerable to DoS via compressed JWE content

CVSS3: 7.5
fstec
около 2 лет назад

Уязвимость JWT-библиотеки Jose4j, связанная с неправильной защитой токенов безопасности, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 5%
0.00019
Низкий

7.5 High

CVSS3