logo

CVE-2017-12972 com.nimbusds:nimbus-jose-jwt

Package

Manager: maven
Name: com.nimbusds:nimbus-jose-jwt
Vulnerable Version: >=0 <4.39

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00148 pctl0.35927

Details

Nimbus JOSE+JWT missing overflow check In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.

Metadata

Created: 2022-05-13T01:30:32Z
Modified: 2022-11-08T22:28:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2qp9-wg27-9pcv/GHSA-2qp9-wg27-9pcv.json
CWE IDs: ["CWE-345"]
Alternative ID: GHSA-2qp9-wg27-9pcv
Finding: F204
Auto approve: 1