com.nimbusds:nimbus-jose-jwt@7.2.1 vulnerabilities

  • latest version

    10.3

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.nimbusds:nimbus-jose-jwt package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

    [,9.37.2)
    • M
    Improper Check for Unusual or Exceptional Conditions

    com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

    Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions. Can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.

    How to fix Improper Check for Unusual or Exceptional Conditions?

    Upgrade com.nimbusds:nimbus-jose-jwt to version 7.8.1 or higher.

    [,7.8.1)