CVE-2023-25653

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25653
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-25653.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-25653
Aliases
Related
Published
2023-02-16T19:15:14Z
Modified
2025-01-15T04:45:03.447045Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in node-jose can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node crypto module is available in the JS environment where node-jose is being run.

References

Affected packages

Git / github.com/cisco/node-jose

Affected ranges

Type
GIT
Repo
https://github.com/cisco/node-jose
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.10.0
0.11.0
0.11.1
0.3.0
0.3.1
0.4.0
0.5.0
0.5.2
0.6.0
0.7.0
0.7.1
0.8.0
0.8.1
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5

1.*

1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4

2.*

2.0.0

Other

latest

v2.*

v2.1.0
v2.1.1