Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jdzJyLTRwODItcXY3Oc4AA4Dz
DoS with algorithms that use PBKDF2 due to unbounded PBES2 Count value
Impact
Denial of Service,
Applications that allow the use of the PBKDF2 algorithm.
Patches
A patch is available that sets the maximum number of default rounds.
Workarounds
Applications that do not need to use PBKDF2 should simply specify the algorithms use and exclude it from the list.
Applications that need to use the algorithm should upgrade to the new version that allows to set a maximum rounds number.
Acknowledgement
The issues was reported by Jingcheng Yang and Jianjun Chen from Sichuan University
and Zhongguancun Lab
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jdzJyLTRwODItcXY3Oc4AA4Dz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 11 months ago
Updated: 20 days ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Identifiers: GHSA-cw2r-4p82-qv79, CVE-2023-6681
References:
- https://github.com/latchset/jwcrypto/security/advisories/GHSA-cw2r-4p82-qv79
- https://github.com/latchset/jwcrypto/commit/d2655d370586cb830e49acfb450f87598da60be8
- https://nvd.nist.gov/vuln/detail/CVE-2023-6681
- https://access.redhat.com/security/cve/CVE-2023-6681
- https://bugzilla.redhat.com/show_bug.cgi?id=2260843
- https://access.redhat.com/errata/RHSA-2024:3267
- https://github.com/pypa/advisory-database/tree/main/vulns/jwcrypto/PYSEC-2024-104.yaml
- https://access.redhat.com/errata/RHSA-2024:9281
- https://github.com/advisories/GHSA-cw2r-4p82-qv79
Blast Radius: 17.5
Affected Packages
pypi:jwcrypto
Dependent packages: 86Dependent repositories: 1,962
Downloads: 3,760,063 last month
Affected Version Ranges: < 1.5.1
Fixed in: 1.5.1
All affected versions: 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.6.0, 0.9.1, 1.3.1, 1.4.1, 1.4.2, 1.5.0
All unaffected versions: 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6