org.bitbucket.b_c:jose4j@0.6.5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.bitbucket.b_c:jose4j package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

Affected versions of this package are vulnerable to Denial of Service (DoS) via a large p2c (PBES2 Count) value. An attacker can cause the application to consume excessive CPU resources by supplying an unusually high PBES2 Count value.

How to fix Denial of Service (DoS)?

Upgrade org.bitbucket.b_c:jose4j to version 0.9.4 or higher.

[,0.9.4)
  • M
Inadequate Encryption Strength

org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

Affected versions of this package are vulnerable to Inadequate Encryption Strength through the iteration count setting, which can reduce the computational effort required to crack the encryption if it is set to a low value.

How to fix Inadequate Encryption Strength?

Upgrade org.bitbucket.b_c:jose4j to version 0.9.3 or higher.

[,0.9.3)
  • H
Use of a Broken or Risky Cryptographic Algorithm

org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to using RSA1_5 which is susceptible to chosen ciphertext attacks. The attack allows decrypting RSA1_5 or RSA_OAEP encrypted ciphertexts. It may be feasible to sign with the affected keys.

How to fix Use of a Broken or Risky Cryptographic Algorithm?

Upgrade org.bitbucket.b_c:jose4j to version 0.9.3 or higher.

[,0.9.3)