CVE-2022-36083Uncontrolled Resource Consumption in Project Jose

Severity
5.3MEDIUMNVD
EPSS
0.5%
top 35.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7
Latest updateSep 16

Description

JOSE is "JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node.js, Browser, Cloudflare Workers, Electron, and Deno. The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` PBES2 Count, which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password br

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages5 packages

Debiancisco/node-jose< 4.9.2-1+1
NVDjose_project/jose1.0.01.28.2+3
npmjose_project/jose1.0.01.28.2+3
CVEListV5panva/jose4 versions+3

Patches

🔴Vulnerability Details

4
OSV
JOSE vulnerable to resource exhaustion via specifically crafted JWE2022-09-16
GHSA
JOSE vulnerable to resource exhaustion via specifically crafted JWE2022-09-16
CVEList
JOSE vulnerable to resource exhaustion via specifically crafted JWE2022-09-07
OSV
CVE-2022-36083: JOSE is "JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS with no dependencies using runtime's native crypto in Node2022-09-07

📋Vendor Advisories

1
Debian
CVE-2022-36083: node-jose - JOSE is "JSON Web Almost Everything" - JWA, JWS, JWE, JWT, JWK, JWKS with no dep...2022
CVE-2022-36083 — Uncontrolled Resource Consumption | cvebase