| - module: gopkg.in/square/go-jose.v1 |
| vulnerable_at: 1.0.0-20160831185616-c7581939a365 |
| - package: gopkg.in/square/go-jose.v1 |
| - JsonWebSignature.Verify |
| - ecDecrypterSigner.decryptKey |
| - rawJsonWebKey.ecPublicKey |
| - JsonWebEncryption.Decrypt |
| - JsonWebKey.UnmarshalJSON |
| - package: gopkg.in/square/go-jose.v1/cipher |
| The go-jose library suffers from multiple signatures exploitation. When |
| validating a signed message, the API did not indicate which signature was |
| valid, which creates the potential for confusion. |
| published: 2022-08-22T17:59:45Z |
| credit: Quan Nguyen from Google's Information Security Engineering Team |
| - advisory: https://www.openwall.com/lists/oss-security/2016/11/03/1 |
| - fix: https://github.com/square/go-jose/pull/111 |
| - fix: https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6 |
| - web: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96 |
| - web: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 |