PyPI: python-jose
CVE-2024-33664
Safety vulnerability ID: SFTY-20240426-11437
Safety legacy ID: pyup.io-70716
Affected versions of Python-jose allow attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
Overview
python-jose denial of service via compressed JWE content
Advisory
Affected versions of Python-jose allow attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
How to Fix
Mitigation and Workarounds
---
Vulnerable Functions
Functions linked to known vulnerabilities.
References
- https://getsafety.com/vulnerabilities/SFTY-20240426-11437/CVE-2024-33664
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33664
- https://github.com/mpdavis/python-jose/issues/344
- https://github.com/mpdavis/python-jose/pull/345
- https://nvd.nist.gov/vuln/detail/CVE-2024-33664
- https://github.com/mpdavis/python-jose/issues/344
- https://github.com/mpdavis/python-jose/pull/345
- https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664
- https://github.com/mpdavis/python-jose/releases/tag/3.4.0
- https://github.com/pypa/advisory-database/tree/main/vulns/python-jose/PYSEC-2024-233.yaml
- https://github.com/advisories/GHSA-cjwg-qfpm-7377
Verified by Safety
Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.
Learn more
