com.nimbusds:nimbus-jose-jwt@8.9 vulnerabilities

  • latest version

    10.4.2

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    14 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.nimbusds:nimbus-jose-jwt package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Uncontrolled Recursion

    com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

    Affected versions of this package are vulnerable to Uncontrolled Recursion due to the improper handling JWT claim sets containing deeply nested JSON objects. An attacker can cause application downtime or resource exhaustion by submitting a specially crafted JWT with excessive nesting.

    Note:

    This issue only affects nimbus-jose-jwt, not Gson because the Connect2id product could have checked the JSON object nesting depth, regardless of what limits (if any) were imposed by Gson.

    How to fix Uncontrolled Recursion?

    Upgrade com.nimbusds:nimbus-jose-jwt to version 10.0.2 or higher.

    [,10.0.2)
    • H
    Allocation of Resources Without Limits or Throttling

    com.nimbusds:nimbus-jose-jwt is a library for JSON Web Tokens (JWT)

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a large JWE p2c header value (AKA iteration count) for the PasswordBasedDecrypter (PBKDF2) class. An attacker can cause resource consumption by specifying an excessively large iteration count.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade com.nimbusds:nimbus-jose-jwt to version 9.37.2 or higher.

    [,9.37.2)