Lucene search

K
cve[email protected]CVE-2024-28102
HistoryMar 21, 2024 - 2:52 a.m.

CVE-2024-28102

2024-03-2102:52:23
CWE-770
web.nvd.nist.gov
66
jwcrypto
jwk
jws
jwe
python-cryptography
cve-2024-28102
security vulnerability

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

Affected configurations

Vulners
Node
latchsetpkcs11-providerRange<1.5.6
VendorProductVersionCPE
latchsetpkcs11\-provider*cpe:2.3:a:latchset:pkcs11\-provider:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "latchset",
    "product": "jwcrypto",
    "versions": [
      {
        "version": "< 1.5.6",
        "status": "affected"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%