漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Go JOSE's Parsing Vulnerable to Denial of Service
Vulnerability Description
Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.
CVSS Information
N/A
Vulnerability Type
不加限制或调节的资源分配
Vulnerability Title
Go JOSE 安全漏洞
Vulnerability Description
Go JOSE是Go JOSE开源的一个 Go 中 JOSE 标准的实现。 Go JOSE 4.x版本至4.0.5之前版本存在安全漏洞,该漏洞源于内存过度消耗。攻击者利用该漏洞可以通过发送恶意令牌导致拒绝服务。
CVSS Information
N/A
Vulnerability Type
N/A