ghsa-c6gw-w398-hv78
Vulnerability from github
Published
2025-02-24 22:49
Modified
2025-02-26 22:16
Severity ?
Summary
DoS in go-jose Parsing
Details
Impact
When parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of '.' characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.
Patches
Version 4.0.5 fixes this issue
Workarounds
Applications could pre-validate payloads passed to go-jose do not contain an excessive number of '.' characters.
References
This is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/go-jose/go-jose/v4" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.0.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/go-jose/go-jose/v3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.0.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/go-jose/go-jose" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.0.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-27144" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2025-02-24T22:49:19Z", "nvd_published_at": "2025-02-24T23:15:11Z", "severity": "MODERATE" }, "details": "### Impact\nWhen parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of \u0027.\u0027 characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.\n\n### Patches\nVersion 4.0.5 fixes this issue\n\n### Workarounds\nApplications could pre-validate payloads passed to go-jose do not contain an excessive number of \u0027.\u0027 characters.\n\n### References\nThis is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490.", "id": "GHSA-c6gw-w398-hv78", "modified": "2025-02-26T22:16:36Z", "published": "2025-02-24T22:49:19Z", "references": [ { "type": "WEB", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/71490" }, { "type": "WEB", "url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22" }, { "type": "PACKAGE", "url": "https://github.com/go-jose/go-jose" }, { "type": "WEB", "url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5" }, { "type": "WEB", "url": "https://go.dev/issue/71490" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "DoS in go-jose Parsing" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.