JWX is Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. This issue has been patched in versions 1.2.29 and 2.0.21.
References
| Link | Resource |
|---|---|
| https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 | Product Release Notes |
| https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 | Product Release Notes |
| https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 | Exploit Vendor Advisory |
| https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 | Product Release Notes |
| https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 | Product Release Notes |
| https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-03-09 01:15
Updated : 2025-12-05 16:23
NVD link : CVE-2024-28122
Mitre link : CVE-2024-28122
CVE.ORG link : CVE-2024-28122
JSON object : View
Products Affected
lestrrat-go
- jwx
CWE
CWE-400
Uncontrolled Resource Consumption
