Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/f3a7a801f0c6b078899fed9226368eb7b44e2b2f - Third Party Advisory | |
References | () https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/217/explicit-check-for-ec-public-key-on-curve - Patch, Third Party Advisory | |
References | () https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt - Release Notes, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E - |
Information
Published : 2017-08-20 16:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12974
Mitre link : CVE-2017-12974
CVE.ORG link : CVE-2017-12974
JSON object : View
Products Affected
connect2id
- nimbus_jose\+jwt
CWE
CWE-347
Improper Verification of Cryptographic Signature