com.nimbusds:nimbus-jose-jwt@4.36.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.nimbusds:nimbus-jose-jwt package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

[,9.37.2)
  • H
Insufficient Verification of Data Authenticity

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity due to missing validation for integer overflow when converting length values from bytes to bits. Exploiting this vulnerability allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.

Note: This vulnerability only affects JWE decryption with A128CBC-HS256, A192CBC-HS384, and A256CBC-HS512 encryption methods.

How to fix Insufficient Verification of Data Authenticity?

Upgrade com.nimbusds:nimbus-jose-jwt to version 4.39 or higher.

[,4.39)
  • L
Cryptographic Issues

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Cryptographic Issues when it proceeds improperly after detecting an invalid HMAC in authenticated AES-CBC decryption in JWE with the A128CBC-HS256, A192CBC-HS384, and A256CBC-HS512 encryption methods. Exploiting this vulnerability allows attackers to conduct a padding oracle attack.

How to fix Cryptographic Issues?

Upgrade com.nimbusds:nimbus-jose-jwt to version 4.39 or higher.

[,4.39)
  • M
Improper Check for Unusual or Exceptional Conditions

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions. Can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.

How to fix Improper Check for Unusual or Exceptional Conditions?

Upgrade com.nimbusds:nimbus-jose-jwt to version 7.8.1 or higher.

[,7.8.1)