0.9.6
11 years ago
2 years ago
Known vulnerabilities in the org.bitbucket.b_c:jose4j package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc... Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the JSON Web Encryption decompression process. An attacker can exhaust system memory and processing resources by submitting a specially crafted JWE token with a very high compression ratio. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,0.9.6) |
org.bitbucket.b_c:jose4j is a robust and easy to use open source implementation of JSON Web Token (JWT) and the JOSE specification suite (JWS, JWE, and JWK). It is written in Java and relies solely on the JCA APIs for cryptography. Please see https://bitbucket.org/b_c/jose4j/wiki/Home for more info, examples, etc... Affected versions of this package are vulnerable to Denial of Service (DoS) via a large How to fix Denial of Service (DoS)? Upgrade | [,0.9.4) |