CVE-2024-29371

EUVD-2024-26381
In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
jose4j_projectjose4j
𝑥
< 0.9.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libjose4j-java
forky
0.9.6-1
fixed
sid
0.9.6-1
fixed
trixie
0.9.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libjose4j-java
jammy
needs-triage
noble
needs-triage
plucky
needs-triage
questing
needs-triage