Headline
GHSA-2c7c-3mj9-8fqh: Decryption of malicious PBES2 JWE objects can consume unbounded system resources
The go-jose package is subject to a “billion hashes attack” causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-2c7c-3mj9-8fqh
Decryption of malicious PBES2 JWE objects can consume unbounded system resources
Moderate severity GitHub Reviewed Published Nov 21, 2023 to the GitHub Advisory Database • Updated Nov 21, 2023
Package
gomod github.com/go-jose/go-jose/v3 (Go)
Affected versions
< 3.0.1
gomod github.com/square/go-jose (Go)
The go-jose package is subject to a “billion hashes attack” causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.
References
- go-jose/go-jose#64
- go-jose/go-jose@65351c2
Published to the GitHub Advisory Database
Nov 21, 2023
Last updated
Nov 21, 2023