been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0938 | jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A vulnerability has been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5. |
Github GHSA |
GHSA-hhhv-q57g-882q | jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fedoraproject
Fedoraproject fedora |
|
| CPEs | cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fedoraproject
Fedoraproject fedora |
Fri, 05 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jose Project
Jose Project jose |
|
| CPEs | cpe:2.3:a:jose_project:jose:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Jose Project
Jose Project jose |
Fri, 14 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat acm
Redhat multicluster Engine |
|
| CPEs | cpe:/a:redhat:acm:2.10::el9 cpe:/a:redhat:acm:2.9::el8 cpe:/a:redhat:multicluster_engine:2.4::el8 cpe:/a:redhat:multicluster_engine:2.5::el8 |
|
| Vendors & Products |
Redhat acm
Redhat multicluster Engine |
Thu, 31 Oct 2024 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.17::el9 |
Thu, 08 Aug 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat service Mesh
|
|
| CPEs | cpe:/a:redhat:service_mesh:2.6::el8 cpe:/a:redhat:service_mesh:2.6::el9 |
|
| Vendors & Products |
Redhat service Mesh
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:47:26.104Z
Reserved: 2024-03-06T17:35:00.856Z
Link: CVE-2024-28176
Updated: 2024-08-02T00:48:49.416Z
Status : Analyzed
Published: 2024-03-09T01:15:07.147
Modified: 2025-12-05T16:48:46.490
Link: CVE-2024-28176
OpenCVE Enrichment
No data.
EUVD
Github GHSA