Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.
References
Link | Resource |
---|---|
https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/6a29f10f723f406eb25555f55842c59a43a38912 | Patch Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/223/aescbc-return-immediately-on-invalid-hmac | Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-08-20 16:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-12973
Mitre link : CVE-2017-12973
CVE.ORG link : CVE-2017-12973
JSON object : View
Products Affected
connect2id
- nimbus_jose\+jwt
CWE
CWE-354
Improper Validation of Integrity Check Value