com.nimbusds:nimbus-jose-jwt@5.5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.nimbusds:nimbus-jose-jwt package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

[,9.37.2)
  • M
Improper Check for Unusual or Exceptional Conditions

com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions. Can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.

How to fix Improper Check for Unusual or Exceptional Conditions?

Upgrade com.nimbusds:nimbus-jose-jwt to version 7.8.1 or higher.

[,7.8.1)