GO-2023-2379

Source
https://pkg.go.dev/vuln/GO-2023-2379
Import Source
https://vuln.go.dev/ID/GO-2023-2379.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2023-2379
Aliases
Published
2023-12-11T15:08:59Z
Modified
2024-05-20T16:03:47Z
Summary
Denial of service due to malicious parameters in github.com/lestrrat-go/jwx
Details

The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a very large number, it can cause excessive computational consumption.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2023-2379"
}
References
Credits
    • @P3ngu1nW

Affected packages

Go / github.com/lestrrat-go/jwx

Package

Name
github.com/lestrrat-go/jwx
View open source insights on deps.dev
Purl
pkg:golang/github.com/lestrrat-go/jwx

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.27

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/lestrrat-go/jwx/jwe",
            "symbols": [
                "Decrypt"
            ]
        }
    ]
}

Go / github.com/lestrrat-go/jwx/v2

Package

Name
github.com/lestrrat-go/jwx/v2
View open source insights on deps.dev
Purl
pkg:golang/github.com/lestrrat-go/jwx/v2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.18

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/lestrrat-go/jwx/v2/jwe",
            "symbols": [
                "Decrypt",
                "decryptCtx.decryptContent"
            ]
        }
    ]
}