-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/dvsekhvalnov/jose2go | go | < 1.5.1-0.20231206184617-48ba0b76bc88 | 1.5.1-0.20231206184617-48ba0b76bc88 |
The vulnerability stems from processing unvalidated 'p2c' values during JWE decryption. The patch adds iteration count guards in Pbse2HmacAesKW.Unwrap, indicating this was the vulnerable function. The CWE-400 classification matches the uncontrolled resource consumption through cryptographic operations with attacker-controlled iteration counts. The test cases added in jose_test.go specifically target p2c validation failures in decryption operations handled by this function.
Ongoing coverage of React2Shell