Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-28176
HistoryMar 09, 2024 - 12:00 a.m.

CVE-2024-28176

2024-03-0900:00:00
ubuntu.com
ubuntu.com
24
cve-2024-28176
json web encryption
user environment
patched

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

5

Confidence

High

EPSS

0

Percentile

13.0%

jose is JavaScript module for JSON Object Signing and Encryption, providing
support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web
Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A
vulnerability has been identified in the JSON Web Encryption (JWE)
decryption interfaces, specifically related to the support for
decompressing plaintext after its decryption. Under certain conditions it
is possible to have the user’s environment consume unreasonable amount of
CPU time or memory during JWE Decryption operations. This issue has been
patched in versions 2.0.7 and 4.15.5.

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchnode-jose< anyUNKNOWN
ubuntu24.04noarchnode-jose< anyUNKNOWN

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

5

Confidence

High

EPSS

0

Percentile

13.0%