blob: 8836c475a652582429c59106c356b078dd496b07 [file] [log] [blame]
id: GO-2023-1859
modules:
- module: github.com/lestrrat-go/jwx
versions:
- fixed: 1.2.26
vulnerable_at: 1.2.25
packages:
- package: github.com/lestrrat-go/jwx/jwe/internal/aescbc
symbols:
- unpad
derived_symbols:
- Hmac.Open
- module: github.com/lestrrat-go/jwx/v2
versions:
- fixed: 2.0.11-0.20230614080639-c8b6bec919a1
vulnerable_at: 2.0.10
packages:
- package: github.com/lestrrat-go/jwx/v2/jwe/internal/aescbc
symbols:
- unpad
derived_symbols:
- Hmac.Open
summary: Padding oracle vulnerability in github.com/lestrrat-go/jwx
description: |-
AES-CBC decryption is vulnerable to a timing attack which may permit an attacker
to recover the plaintext of JWE data.
ghsas:
- GHSA-rm8v-mxj3-5rmq
references:
- fix: https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103
- fix: https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6