CVE-2023-6681: DoS with algorithms that use PBKDF2 due to unbounded PBES2 Count value
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.06463%
CWE
Published
12/28/2023
Updated
11/12/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jwcrypto | pip | < 1.5.1 | 1.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lack of validation on the 'p2c' parameter in PBES2 key derivation. The patch adds a check against 'default_max_pbkdf2_iterations' in PBES2._get_key, confirming this was the vulnerable point. The tests added in jwcrypto/tests.py explicitly validate this boundary by triggering an error when p2c exceeds the maximum, reinforcing that this function was the attack surface.