CVE-2016-6298: jwcrypto lacks the Random Filling protection mechanism
(updated )
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
References
- github.com/advisories/GHSA-wg33-x934-3ghh
- github.com/latchset/jwcrypto
- github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba
- github.com/latchset/jwcrypto/issues/65
- github.com/latchset/jwcrypto/pull/66
- github.com/latchset/jwcrypto/releases/tag/v0.3.2
- github.com/pypa/advisory-database/tree/main/vulns/jwcrypto/PYSEC-2016-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2016-6298
- web.archive.org/web/20200227230613/http://www.securityfocus.com/bid/92729
Detect and mitigate CVE-2016-6298 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →