Lucene search

K
githubGitHub Advisory DatabaseGHSA-C5Q2-7R4C-MV6G
HistoryMar 07, 2024 - 10:54 p.m.

Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)

2024-03-0722:54:44
CWE-409
GitHub Advisory Database
github.com
26
improper handling vulnerability
highly compressed data
data amplification
memory consumption
cpu usage
jwe
vulnerability patch
enze wang
jianjun chen
v4.0.1
v3.0.3
v2.6.3

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

17.1%

Impact

An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.

Patches

The problem is fixed in the following packages and versions:

The problem will not be fixed in the following package because the package is archived:

Affected configurations

Vulners
Node
squaresqualorRange2.6.0go
OR
go-josego-jose.v2Range<2.6.3
OR
go-josego-joseRange<3.0.3
OR
go-josego-joseRange<4.0.1
VendorProductVersionCPE
squaresqualor*cpe:2.3:a:square:squalor:*:*:*:*:*:go:*:*
go-josego-jose.v2*cpe:2.3:a:go-jose:go-jose.v2:*:*:*:*:*:*:*:*
go-josego-jose*cpe:2.3:a:go-jose:go-jose:*:*:*:*:*:*:*:*

References

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

17.1%