CVE-2023-52428: Denial of Service in Connect2id Nimbus JOSE+JWT
7.5
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.nimbusds:nimbus-jose-jwt | maven | < 9.37.2 | 9.37.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions the 'PasswordBasedDecrypter (PBKDF2) component' and the 'p2c header value (aka iteration count)' as the source of the denial of service. The decrypt method within this component is the logical place where the JWE headers, including 'p2c', would be processed to perform decryption. Without access to the specific commit diff, the exact function name and file path are inferred based on common Java naming conventions and the typical structure of such libraries. The patch would involve adding a check to limit the maximum allowed value for 'p2c' within this decryption process. The confidence is medium because the exact code changes are not visible, and the function name is inferred based on the component name and its typical functionality in a JOSE/JWT library. The GHSA advisory and NVD entry confirm the component and the nature of the vulnerability (resource consumption due to large iteration count).