Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.
References
Link | Resource |
---|---|
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt | Release Notes Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/223/aescbc-return-immediately-on-invalid-hmac | Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/6a29f10f723f406eb25555f55842c59a43a38912 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-20 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-12973
Mitre link : CVE-2017-12973
JSON object : View
CWE
CWE-354
Improper Validation of Integrity Check Value
Products Affected
connect2id
- nimbus_jose\+jwt