Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
References
Link | Resource |
---|---|
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt | Release Notes Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/217/explicit-check-for-ec-public-key-on-curve | Patch Third Party Advisory |
https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/f3a7a801f0c6b078899fed9226368eb7b44e2b2f | Third Party Advisory |
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-20 09:29
Updated : 2019-11-15 18:15
NVD link : CVE-2017-12974
Mitre link : CVE-2017-12974
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
connect2id
- nimbus_jose\+jwt