The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
References
Link | Resource |
---|---|
https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba | Issue Tracking Patch Vendor Advisory |
https://github.com/latchset/jwcrypto/issues/65 | Issue Tracking Vendor Advisory |
https://github.com/latchset/jwcrypto/pull/66 | Issue Tracking Patch |
https://github.com/latchset/jwcrypto/releases/tag/v0.3.2 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/92729 |
Configurations
Information
Published : 2016-09-01 16:59
Updated : 2016-11-28 12:31
NVD link : CVE-2016-6298
Mitre link : CVE-2016-6298
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
jwcrypto_project
- jwcrypto