You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Vulnerable Library - python_jose-3.3.0-py2.py3-none-any.whl
JOSE implementation in Python
Library home page: https://files.pythonhosted.org/packages/bd/2d/e94b2f7bab6773c70efc70a61d66e312e1febccd9e0db6b9e0adf58cbad1/python_jose-3.3.0-py2.py3-none-any.whl
Path to dependency file: /sample/HelloWorld/requirements.txt
Path to vulnerable library: /sample/HelloWorld/requirements.txt,/tmp/ws-scm/Opentok-Python-SDK,/requirements.txt
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-33663
Vulnerable Library - python_jose-3.3.0-py2.py3-none-any.whl
JOSE implementation in Python
Library home page: https://files.pythonhosted.org/packages/bd/2d/e94b2f7bab6773c70efc70a61d66e312e1febccd9e0db6b9e0adf58cbad1/python_jose-3.3.0-py2.py3-none-any.whl
Path to dependency file: /sample/HelloWorld/requirements.txt
Path to vulnerable library: /sample/HelloWorld/requirements.txt,/tmp/ws-scm/Opentok-Python-SDK,/requirements.txt
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key formats. This is similar to CVE-2022-29217.
Publish Date: 2024-04-25
URL: CVE-2024-33663
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (6.5)
Base Score Metrics:
CVE-2024-33664
Vulnerable Library - python_jose-3.3.0-py2.py3-none-any.whl
JOSE implementation in Python
Library home page: https://files.pythonhosted.org/packages/bd/2d/e94b2f7bab6773c70efc70a61d66e312e1febccd9e0db6b9e0adf58cbad1/python_jose-3.3.0-py2.py3-none-any.whl
Path to dependency file: /sample/HelloWorld/requirements.txt
Path to vulnerable library: /sample/HelloWorld/requirements.txt,/tmp/ws-scm/Opentok-Python-SDK,/requirements.txt
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Publish Date: 2024-04-25
URL: CVE-2024-33664
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (5.3)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: