Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-28176
HistoryMar 09, 2024 - 12:00 a.m.

CVE-2024-28176

2024-03-0900:00:00
ubuntu.com
ubuntu.com
13
cve-2024-28176
json web encryption
user environment
patched

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

jose is JavaScript module for JSON Object Signing and Encryption, providing
support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web
Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A
vulnerability has been identified in the JSON Web Encryption (JWE)
decryption interfaces, specifically related to the support for
decompressing plaintext after its decryption. Under certain conditions it
is possible to have the user’s environment consume unreasonable amount of
CPU time or memory during JWE Decryption operations. This issue has been
patched in versions 2.0.7 and 4.15.5.

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%