Skip to content

Commit

Permalink
data/reports: add GO-2023-2334.yaml
Browse files Browse the repository at this point in the history
Fixes #2334

Change-Id: I90ec0b8e0bcc8566e50c984f5b3db9e915c6faf1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/544075
LUCI-TryBot-Result: Go LUCI <[email protected]>
Auto-Submit: Roland Shoemaker <[email protected]>
Reviewed-by: Tatiana Bradley <[email protected]>
  • Loading branch information
rolandshoemaker authored and gopherbot committed Nov 21, 2023
1 parent 11d29d0 commit 746c68f
Show file tree
Hide file tree
Showing 2 changed files with 113 additions and 0 deletions.
82 changes: 82 additions & 0 deletions data/osv/GO-2023-2334.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2334",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"summary": "Decryption of malicious PBES2 JWE objects can consume unbounded system resources",
"details": "The go-jose package is subject to a \"billion hashes attack\" causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.",
"affected": [
{
"package": {
"name": "github.com/go-jose/go-jose/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/go-jose/go-jose/v3",
"symbols": [
"JSONWebEncryption.Decrypt",
"JSONWebEncryption.DecryptMulti",
"symmetricKeyCipher.decryptKey"
]
}
]
}
},
{
"package": {
"name": "github.com/square/go-jose",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/square/go-jose",
"symbols": [
"JSONWebEncryption.Decrypt",
"JSONWebEncryption.DecryptMulti",
"symmetricKeyCipher.decryptKey"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/go-jose/go-jose/commit/65351c27657d58960c2e6c9fbb2b00f818e50568"
},
{
"type": "REPORT",
"url": "https://github.com/go-jose/go-jose/issues/64"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2334"
}
}
31 changes: 31 additions & 0 deletions data/reports/GO-2023-2334.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
id: GO-2023-2334
modules:
- module: github.com/go-jose/go-jose/v3
versions:
- fixed: 3.0.1
vulnerable_at: 3.0.0
packages:
- package: github.com/go-jose/go-jose/v3
symbols:
- symmetricKeyCipher.decryptKey
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
- module: github.com/square/go-jose
vulnerable_at: 2.6.0+incompatible
packages:
- package: github.com/square/go-jose
symbols:
- symmetricKeyCipher.decryptKey
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
summary: Decryption of malicious PBES2 JWE objects can consume unbounded system resources
description: |-
The go-jose package is subject to a "billion hashes attack" causing
denial-of-service when decrypting JWE inputs. This occurs when an attacker can
provide a PBES2 encrypted JWE blob with a very large p2c value that, when
decrypted, produces a denial-of-service.
references:
- fix: https://github.com/go-jose/go-jose/commit/65351c27657d58960c2e6c9fbb2b00f818e50568
- report: https://github.com/go-jose/go-jose/issues/64

0 comments on commit 746c68f

Please sign in to comment.