JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3883-1 | python-jwcrypto security update |
![]() |
EUVD-2024-0946 | JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. |
![]() |
GHSA-j857-7rvv-vj97 | JWCrypto vulnerable to JWT bomb Attack in `deserialize` function |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 09 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 19 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-09T13:06:44.240Z
Reserved: 2024-03-04T14:19:14.058Z
Link: CVE-2024-28102

Updated: 2024-09-09T13:06:44.240Z

Status : Awaiting Analysis
Published: 2024-03-21T02:52:23.513
Modified: 2024-11-21T09:05:49.187
Link: CVE-2024-28102


No data.