CVE-2016-9122

go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
VendorProductVersion
go-jose_projectgo-jose
𝑥
≤ 1.0.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
golang-gopkg-square-go-jose.v1
bullseye
1.1.2-2
fixed
sid
1.1.2-4
fixed
trixie
1.1.2-4
fixed
bookworm
1.1.2-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-gopkg-square-go-jose.v1
zesty
not-affected
yakkety
ignored
xenial
dne
trusty
dne
precise
dne