go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
References
Link | Resource |
---|---|
https://hackerone.com/reports/164590 | Permissions Required |
https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/11/03/1 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2017-03-27 19:59
Updated : 2017-03-29 10:39
NVD link : CVE-2016-9121
Mitre link : CVE-2016-9121
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
go-jose_project
- go-jose