Lucene search

K
githubGitHub Advisory DatabaseGHSA-9MG4-V392-8J68
HistoryMar 19, 2024 - 3:30 p.m.

erlang-jose vulnerable to denial of service via large p2c value

2024-03-1915:30:34
CWE-400
GitHub Advisory Database
github.com
5
erlang-jose
denial of service
cpu consumption
pbes2 count
jose header
vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

High

EPSS

0

Percentile

15.5%

erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.

Affected configurations

Vulners
Node
joseRange<1.11.7
VendorProductVersionCPE
*jose*cpe:2.3:a:*:jose:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

7

Confidence

High

EPSS

0

Percentile

15.5%