CVE-2024-28180: Go JOSE vulnerable to Improper Handling of Highly Compressed Data (Data Amplification)
(updated )
Impact
An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.
Patches
The problem is fixed in v4.0.1, v3.0.3, v2.6.3
References
- github.com/advisories/GHSA-c5q2-7r4c-mv6g
- github.com/go-jose/go-jose
- github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298
- github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a
- github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502
- github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
- nvd.nist.gov/vuln/detail/CVE-2024-28180
Detect and mitigate CVE-2024-28180 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →