Closed mend-for-github-com[bot] closed 6 months ago
JOSE implementation in Python
Library home page: https://files.pythonhosted.org/packages/bd/2d/e94b2f7bab6773c70efc70a61d66e312e1febccd9e0db6b9e0adf58cbad1/python_jose-3.3.0-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy: - :x: **python_jose-3.3.0-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: 17aabd6cda404f8a0f1f33c694e32291b3cfc316
Found in base branch: 3.0
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Publish Date: 2024-04-25
URL: CVE-2024-33664
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Already opened in https://github.com/GNS3/gns3-server/issues/2372
CVE-2024-33664 - High Severity Vulnerability
Vulnerable Library - python_jose-3.3.0-py2.py3-none-any.whl
JOSE implementation in Python
Library home page: https://files.pythonhosted.org/packages/bd/2d/e94b2f7bab6773c70efc70a61d66e312e1febccd9e0db6b9e0adf58cbad1/python_jose-3.3.0-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy: - :x: **python_jose-3.3.0-py2.py3-none-any.whl** (Vulnerable Library)
Found in HEAD commit: 17aabd6cda404f8a0f1f33c694e32291b3cfc316
Found in base branch: 3.0
Vulnerability Details
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Publish Date: 2024-04-25
URL: CVE-2024-33664
CVSS 3 Score Details (7.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.