org.bitbucket.b_c:jose4j@0.7.8

  • latest version

    0.9.6

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.bitbucket.b_c:jose4j package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the JSON Web Encryption decompression process. An attacker can exhaust system memory and processing resources by submitting a specially crafted JWE token with a very high compression ratio.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.6 or higher.

    [,0.9.6)
    • H
    Denial of Service (DoS)

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Denial of Service (DoS) via a large p2c (PBES2 Count) value. An attacker can cause the application to consume excessive CPU resources by supplying an unusually high PBES2 Count value.

    How to fix Denial of Service (DoS)?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.4 or higher.

    [,0.9.4)
    • M
    Inadequate Encryption Strength

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Inadequate Encryption Strength through the iteration count setting, which can reduce the computational effort required to crack the encryption if it is set to a low value.

    How to fix Inadequate Encryption Strength?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.3 or higher.

    [,0.9.3)
    • H
    Use of a Broken or Risky Cryptographic Algorithm

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to using RSA1_5 which is susceptible to chosen ciphertext attacks. The attack allows decrypting RSA1_5 or RSA_OAEP encrypted ciphertexts. It may be feasible to sign with the affected keys.

    How to fix Use of a Broken or Risky Cryptographic Algorithm?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.3 or higher.

    [,0.9.3)