JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 19 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-09T13:06:44.240Z
Reserved: 2024-03-04T14:19:14.058Z
Link: CVE-2024-28102

Updated: 2024-09-09T13:06:44.240Z

Status : Awaiting Analysis
Published: 2024-03-21T02:52:23.513
Modified: 2024-11-21T09:05:49.187
Link: CVE-2024-28102
