JWX is Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. This issue has been patched in versions 1.2.29 and 2.0.21.
References
Configurations
No configuration.
History
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 - | |
References | () https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 - | |
References | () https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 - | |
Summary |
|
09 Mar 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-09 01:15
Updated : 2024-11-21 09:05
NVD link : CVE-2024-28122
Mitre link : CVE-2024-28122
CVE.ORG link : CVE-2024-28122
JSON object : View
Products Affected
No product.
CWE
CWE-400
Uncontrolled Resource Consumption