CVE-2024-21664

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21664
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-21664.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-21664
Aliases
Related
Published
2024-01-09T20:15:43Z
Modified
2024-05-14T13:08:51.368201Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling jws.Parse with a JSON serialized payload where the signature field is present while protected is absent can lead to a nil pointer dereference. The vulnerability can be used to crash/DOS a system doing JWS verification. This vulnerability has been patched in versions 2.0.19 and 1.2.28.

References

Affected packages

Git / github.com/lestrrat-go/jwx

Affected ranges

Type
GIT
Repo
https://github.com/lestrrat-go/jwx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

v0.*

v0.9.0
v0.9.1
v0.9.2

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.1.5-rc1
v1.1.6
v1.1.7
v1.1.7-rc1
v1.1.8-rc1
v1.2.0
v1.2.1
v1.2.10
v1.2.11
v1.2.12
v1.2.13
v1.2.14
v1.2.15
v1.2.17
v1.2.18
v1.2.19
v1.2.2
v1.2.20
v1.2.21
v1.2.22
v1.2.23
v1.2.24
v1.2.25
v1.2.26
v1.2.27
v1.2.3
v1.2.4
v1.2.5
v1.2.6
v1.2.7
v1.2.8
v1.2.9

v2.*

v2.0.0
v2.0.0-alpha1
v2.0.0-beta1
v2.0.0-beta2
v2.0.1
v2.0.10
v2.0.11
v2.0.12
v2.0.14
v2.0.15
v2.0.16
v2.0.17
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9