CVE-2024-29370

In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
References
Link Resource
https://github.com/mpdavis/python-jose/issues/344 Exploit Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:python-jose_project:python-jose:3.3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-17 16:16

Updated : 2026-01-05 15:14


NVD link : CVE-2024-29370

Mitre link : CVE-2024-29370

CVE.ORG link : CVE-2024-29370


JSON object : View

Products Affected

python-jose_project

  • python-jose
CWE
CWE-409

Improper Handling of Highly Compressed Data (Data Amplification)