org.bitbucket.b_c:jose4j@0.9.3

  • latest version

    0.9.6

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.bitbucket.b_c:jose4j package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the JSON Web Encryption decompression process. An attacker can exhaust system memory and processing resources by submitting a specially crafted JWE token with a very high compression ratio.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.6 or higher.

    [,0.9.6)
    • H
    Denial of Service (DoS)

    org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc...

    Affected versions of this package are vulnerable to Denial of Service (DoS) via a large p2c (PBES2 Count) value. An attacker can cause the application to consume excessive CPU resources by supplying an unusually high PBES2 Count value.

    How to fix Denial of Service (DoS)?

    Upgrade org.bitbucket.b_c:jose4j to version 0.9.4 or higher.

    [,0.9.4)