CVE-2024-28180

4.3 MEDIUM
Published: March 09, 2024 Modified: December 03, 2025

Description

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
Source: security-advisories@github.com
Vendor Advisory
https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.3 / 10.0
EPSS (Exploit Probability)
3.6%
87th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

go-jose_project fedoraproject