In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/go-jose/go-jose
to version 3.0.4, 4.0.5 or higher.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the use of strings.Split
to split JWT tokens. An attacker can cause memory exhaustion and service disruption by sending numerous malformed tokens with a large number of .
characters.
This vulnerability can be mitigated by pre-validating that payloads passed to Go JOSE do not contain an excessive number of .
characters.