Description
jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference. The vulnerability can be used to crash/DOS a system doing JWS verification. This vulnerability has been patched in versions 2.0.19 and 1.2.28.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0395 | jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference. The vulnerability can be used to crash/DOS a system doing JWS verification. This vulnerability has been patched in versions 2.0.19 and 1.2.28. |
Github GHSA |
GHSA-pvcr-v8j8-j5q3 | Parsing JSON serialized payload without protected field can lead to segfault |
References
History
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-17T20:59:10.877Z
Reserved: 2023-12-29T16:10:20.367Z
Link: CVE-2024-21664
Updated: 2024-08-01T22:27:36.099Z
Status : Modified
Published: 2024-01-09T20:15:43.740
Modified: 2024-11-21T08:54:49.440
Link: CVE-2024-21664
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA