CVE-2023-50966: erlang-jose vulnerable to denial of service via large p2c value
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03412%
CWE
Published
3/19/2024
Updated
4/10/2024
KEV Status
No
Technology
Erlang
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
jose | erlang | < 1.11.7 | 1.11.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from uncontrolled PBES2 iteration counts ('p2c') in JWE key derivation. The commit diff shows the critical fix was adding a p2c maximum check in the 'pbkdf2' function. Prior to the patch, this function called PBKDF2 with attacker-controlled iterations directly. The functions 'key_decrypt' and 'key_encrypt' in the same file utilize 'pbkdf2', but the root vulnerability lies in 'pbkdf2' lacking iteration validation. The patch introduces 'jose:pbes2_count_maximum()' precisely to constrain this parameter in 'pbkdf2', confirming its role as the vulnerable function.