Vulnerability Details CVE-2024-29371
In jose4j before 0.9.5, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.2%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2024-29371
-
cpe:2.3:a:jose4j_project:jose4j:-
-
cpe:2.3:a:jose4j_project:jose4j:0.1.0
-
cpe:2.3:a:jose4j_project:jose4j:0.1.1
-
cpe:2.3:a:jose4j_project:jose4j:0.2.0
-
cpe:2.3:a:jose4j_project:jose4j:0.2.1
-
cpe:2.3:a:jose4j_project:jose4j:0.2.2
-
cpe:2.3:a:jose4j_project:jose4j:0.2.3
-
cpe:2.3:a:jose4j_project:jose4j:0.2.4
-
cpe:2.3:a:jose4j_project:jose4j:0.2.5
-
cpe:2.3:a:jose4j_project:jose4j:0.2.6
-
cpe:2.3:a:jose4j_project:jose4j:0.2.7
-
cpe:2.3:a:jose4j_project:jose4j:0.3.0
-
cpe:2.3:a:jose4j_project:jose4j:0.3.1
-
cpe:2.3:a:jose4j_project:jose4j:0.3.2
-
cpe:2.3:a:jose4j_project:jose4j:0.3.3
-
cpe:2.3:a:jose4j_project:jose4j:0.3.4
-
cpe:2.3:a:jose4j_project:jose4j:0.3.5
-
cpe:2.3:a:jose4j_project:jose4j:0.3.6
-
cpe:2.3:a:jose4j_project:jose4j:0.3.7
-
cpe:2.3:a:jose4j_project:jose4j:0.3.8
-
cpe:2.3:a:jose4j_project:jose4j:0.3.9
-
cpe:2.3:a:jose4j_project:jose4j:0.4.0
-
cpe:2.3:a:jose4j_project:jose4j:0.4.1
-
cpe:2.3:a:jose4j_project:jose4j:0.4.2
-
cpe:2.3:a:jose4j_project:jose4j:0.4.3
-
cpe:2.3:a:jose4j_project:jose4j:0.4.4
-
cpe:2.3:a:jose4j_project:jose4j:0.5.0
-
cpe:2.3:a:jose4j_project:jose4j:0.5.1
-
cpe:2.3:a:jose4j_project:jose4j:0.5.2
-
cpe:2.3:a:jose4j_project:jose4j:0.5.3
-
cpe:2.3:a:jose4j_project:jose4j:0.5.4
-
cpe:2.3:a:jose4j_project:jose4j:0.5.5
-
cpe:2.3:a:jose4j_project:jose4j:0.5.6
-
cpe:2.3:a:jose4j_project:jose4j:0.5.7
-
cpe:2.3:a:jose4j_project:jose4j:0.5.8
-
cpe:2.3:a:jose4j_project:jose4j:0.6.0
-
cpe:2.3:a:jose4j_project:jose4j:0.6.1
-
cpe:2.3:a:jose4j_project:jose4j:0.6.2
-
cpe:2.3:a:jose4j_project:jose4j:0.6.3
-
cpe:2.3:a:jose4j_project:jose4j:0.6.4
-
cpe:2.3:a:jose4j_project:jose4j:0.6.5
-
cpe:2.3:a:jose4j_project:jose4j:0.7.0
-
cpe:2.3:a:jose4j_project:jose4j:0.7.1
-
cpe:2.3:a:jose4j_project:jose4j:0.7.10
-
cpe:2.3:a:jose4j_project:jose4j:0.7.11
-
cpe:2.3:a:jose4j_project:jose4j:0.7.12
-
cpe:2.3:a:jose4j_project:jose4j:0.7.2
-
cpe:2.3:a:jose4j_project:jose4j:0.7.3
-
cpe:2.3:a:jose4j_project:jose4j:0.7.4
-
cpe:2.3:a:jose4j_project:jose4j:0.7.5
-
cpe:2.3:a:jose4j_project:jose4j:0.7.6
-
cpe:2.3:a:jose4j_project:jose4j:0.7.7
-
cpe:2.3:a:jose4j_project:jose4j:0.7.8
-
cpe:2.3:a:jose4j_project:jose4j:0.7.9
-
cpe:2.3:a:jose4j_project:jose4j:0.8.0
-
cpe:2.3:a:jose4j_project:jose4j:0.9.0
-
cpe:2.3:a:jose4j_project:jose4j:0.9.1
-
cpe:2.3:a:jose4j_project:jose4j:0.9.2
-
cpe:2.3:a:jose4j_project:jose4j:0.9.3