Miggo Logo

CVE-2023-52428: Denial of Service in Connect2id Nimbus JOSE+JWT

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.24038%
Published
2/11/2024
Updated
10/30/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.nimbusds:nimbus-jose-jwtmaven< 9.37.29.37.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly mentions the 'PasswordBasedDecrypter (PBKDF2) component' and the 'p2c header value (aka iteration count)' as the source of the denial of service. The decrypt method within this component is the logical place where the JWE headers, including 'p2c', would be processed to perform decryption. Without access to the specific commit diff, the exact function name and file path are inferred based on common Java naming conventions and the typical structure of such libraries. The patch would involve adding a check to limit the maximum allowed value for 'p2c' within this decryption process. The confidence is medium because the exact code changes are not visible, and the function name is inferred based on the component name and its typical functionality in a JOSE/JWT library. The GHSA advisory and NVD entry confirm the component and the nature of the vulnerability (resource consumption due to large iteration count).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *onn**t*i* Nim*us JOS*+JWT ***or* *.**.*, *n *tt**k*r **n **us* * **ni*l o* s*rvi** (r*sour** *onsumption) vi* * l*r** JW* p** *****r v*lu* (*k* it*r*tion *ount) *or t** P*sswor***s*****rypt*r (P*K***) *ompon*nt.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly m*ntions t** 'P*sswor***s*****rypt*r (P*K***) *ompon*nt' *n* t** 'p** *****r v*lu* (*k* it*r*tion *ount)' *s t** sour** o* t** **ni*l o* s*rvi**. T** `***rypt` m*t*o* wit*in t*is *ompon*nt is t** lo*i**l pl***