Description
go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1289 | go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack. |
Github GHSA |
GHSA-86r9-39j9-99wp | Elliptic Curve Key Disclosure in go-jose |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-06T02:42:10.399Z
Reserved: 2016-10-31T00:00:00.000Z
Link: CVE-2016-9121
No data.
Status : Deferred
Published: 2017-03-28T02:59:00.213
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-9121
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA