2 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 127EXPL: 0

In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC. En Nimbus JOSE+JWT en versiones anteriores a la 4.39 no hay comprobación de desbordamiento de enteros al convertir valores de longitud de bytes a bits, lo que permite que atacantes lleven a cabo ataques de omisión HMAC mediante el cambio de Additional Authenticated Data (AAD) y texto cifrado. Así, se obtiene texto plano diferente a partir del mismo HMAC. • https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/0d2bd649ea386539220d4facfe1f65eb1dadb86c https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/224/byte-to-bit-overflow-in-cbc https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 4.3EPSS: 0%CPEs: 127EXPL: 0

Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack. Nimbus JOSE+JWT en versiones anteriores a la 4.39 procede de forma inadecuada tras detectar un HMAC no válido en un descifrado AES-CBC, lo que permite que atacantes lleven a cabo un ataque padding oracle. • https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/6a29f10f723f406eb25555f55842c59a43a38912 https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/223/aescbc-return-immediately-on-invalid-hmac https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt • CWE-354: Improper Validation of Integrity Check Value •