Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔐 CVE-2023-52428: com.nimbusds:nimbus-jose-jwt:jar:9.8.1:compile #294

Closed
github-actions bot opened this issue Feb 13, 2024 · 0 comments · Fixed by #297
Closed

🔐 CVE-2023-52428: com.nimbusds:nimbus-jose-jwt:jar:9.8.1:compile #294

github-actions bot opened this issue Feb 13, 2024 · 0 comments · Fixed by #297
Assignees
Labels
security Security related change

Comments

@github-actions
Copy link

Summary

In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.

CVE: CVE-2023-52428
CWE: CWE-400

References

@github-actions github-actions bot added the security Security related change label Feb 13, 2024
@Shmuma Shmuma self-assigned this Mar 11, 2024
@Shmuma Shmuma mentioned this issue Mar 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related change
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant