CVE-2024-28122

JWX is Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. This issue has been patched in versions 1.2.29 and 2.0.21.
Configurations

No configuration.

History

21 Nov 2024, 09:05

Type Values Removed Values Added
References () https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 - () https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 -
References () https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 - () https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 -
References () https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 - () https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 -
Summary
  • (es) JWX es un módulo Go que implementa varias tecnologías JWx (JWA/JWE/JWK/JWS/JWT, también conocidas como JOSE). Esta vulnerabilidad permite a un atacante con una clave pública confiable provocar una condición de denegación de servicio (DoS) mediante la creación de un token JSON Web Encryption (JWE) malicioso con una relación de compresión excepcionalmente alta. Este problema se solucionó en las versiones 1.2.29 y 2.0.21.

09 Mar 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-09 01:15

Updated : 2024-11-21 09:05


NVD link : CVE-2024-28122

Mitre link : CVE-2024-28122

CVE.ORG link : CVE-2024-28122


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption