In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
References
| Link | Resource |
|---|---|
| https://github.com/mpdavis/python-jose/issues/344 | Exploit Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2025-12-17 16:16
Updated : 2026-01-05 15:14
NVD link : CVE-2024-29370
Mitre link : CVE-2024-29370
CVE.ORG link : CVE-2024-29370
JSON object : View
Products Affected
python-jose_project
- python-jose
CWE
CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
