Vulnerability Description
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Connect2Id | Nimbus Jose\+Jwt | < 7.9 |
| Apache | Hadoop | 3.2.1 |
| Oracle | Communications Cloud Native Core Security Edge Protection Proxy | 1.7.0 |
| Oracle | Communications Pricing Design Center | 12.0.0.3.0 |
| Oracle | Data Integrator | 12.2.1.4.0 |
| Oracle | Enterprise Manager Base Platform | 13.4.0.0 |
| Oracle | Healthcare Data Repository | 8.1.0 |
| Oracle | Insurance Policy Administration | >= 11.0, <= 11.3.1 |
| Oracle | Jd Edwards Enterpriseone Orchestrator | <= 9.2.5.3 |
| Oracle | Jd Edwards Enterpriseone Tools | <= 9.2.5.3 |
| Oracle | Peoplesoft Enterprise Peopletools | 8.58 |
| Oracle | Policy Automation | >= 12.2.0, <= 12.2.22 |
| Oracle | Primavera Gateway | >= 18.8.0, <= 18.8.11 |
| Oracle | Solaris Cluster | 4.0 |
| Oracle | Weblogic Server | 12.2.1.3.0 |
Related Weaknesses (CWE)
References
- https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.tRelease NotesThird Party Advisory
- https://connect2id.com/blog/nimbus-jose-jwt-7-9Release NotesVendor Advisory
- https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9
- https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e
- https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b303
- https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89f
- https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b49
- https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077
- https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6
- https://www.oracle.com//security-alerts/cpujul2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuApr2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2020.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2022.htmlNot Applicable
FAQ
What is CVE-2019-17195?
CVE-2019-17195 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentic...
How severe is CVE-2019-17195?
CVE-2019-17195 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17195?
Check the references section above for vendor advisories and patch information. Affected products include: Connect2Id Nimbus Jose\+Jwt, Apache Hadoop, Oracle Communications Cloud Native Core Security Edge Protection Proxy, Oracle Communications Pricing Design Center, Oracle Data Integrator.