View all vulnerabilities

CVE-2024-28180

Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)

### ImpactAn attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.### PatchesThe problem is fixed in the following packages and versions:- github.com/go-jose/go-jose/v4 version 4.0.1- github.com/go-jose/go-jose/v3 version 3.0.3- gopkg.in/go-jose/go-jose.v2 version 2.6.3The problem will not be fixed in the following package because the package is archived:- gopkg.in/square/go-jose.v2

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
4.2
Score Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Versions
github.com/go-jose/go-jose/v4 < 4.0.1; github.com/go-jose/go-jose/v3 < 3.0.3; gopkg.in/go-jose/go-jose.v2 < 2.6.3
Severity
Medium
Ecosystem
GO
Publish Date
March 7, 2024
Modified Date
February 13, 2025