logo

CVE-2016-6298 jwcrypto

Package

Manager: pip
Name: jwcrypto
Vulnerable Version: >=0 <0.3.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00446 pctl0.62581

Details

jwcrypto lacks the Random Filling protection mechanism The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).

Metadata

Created: 2022-05-17T03:39:31Z
Modified: 2024-11-19T19:24:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wg33-x934-3ghh/GHSA-wg33-x934-3ghh.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-wg33-x934-3ghh
Finding: F017
Auto approve: 1