Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-39373

Опубликовано: 07 апр. 2026
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in JWCrypto, a Python library for JSON Web Key (JWK), JSON Web Signature (JWS), and JSON Web Encryption (JWE) specifications. An unauthenticated attacker can exploit this vulnerability by sending specially crafted JWE tokens that use ZIP compression. While the input token size is limited, the decompressed output size is not validated, allowing an attacker to cause excessive memory consumption. This can lead to memory exhaustion on affected systems, resulting in a Denial of Service (DoS).

Отчет

This is an Important denial of service vulnerability in JWCrypto, a Python library used in Red Hat products such as Red Hat Ansible Automation Platform and Red Hat Enterprise Linux. An unauthenticated attacker can send specially crafted JWE tokens with ZIP compression, leading to excessive memory consumption and potential system exhaustion. This can result in a denial of service on affected systems.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/lightspeed-rhel8Will not fix
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/lightspeed-rhel8Affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/controller-rhel9Affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/gateway-rhel9Affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/lightspeed-rhel9Affected
Red Hat Ansible Automation Platform 2automation-controllerAffected
Red Hat Ansible Automation Platform 2python3.11-jwcryptoNot affected
Red Hat Ansible Automation Platform 2python3.12-jwcryptoAffected
Red Hat Enterprise Linux 10python-jwcryptoAffected
Red Hat Enterprise Linux 7python-jwcryptoAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2456187JWCrypto: python-cryptography: python: JWCrypto: Memory exhaustion via crafted compressed JWE tokens

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
8 дней назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7.

CVSS3: 5.3
nvd
8 дней назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7.

CVSS3: 5.3
debian
8 дней назад

JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ...

CVSS3: 5.3
github
8 дней назад

JWCrypto: JWE ZIP decompression bomb

7.5 High

CVSS3