Vulnerability Description
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Python-Jose Project | Python-Jose | <= 3.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/mpdavis/python-jose/issues/344ExploitIssue TrackingMitigation
- https://github.com/mpdavis/python-jose/pull/345Issue TrackingPatch
- https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664ExploitMitigationThird Party Advisory
- https://github.com/mpdavis/python-jose/issues/344ExploitIssue TrackingMitigation
- https://github.com/mpdavis/python-jose/pull/345Issue TrackingPatch
- https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664ExploitMitigationThird Party Advisory
FAQ
What is CVE-2024-33664?
CVE-2024-33664 is a vulnerability with a CVSS score of 5.3 (MEDIUM). python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT b...
How severe is CVE-2024-33664?
CVE-2024-33664 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-33664?
Check the references section above for vendor advisories and patch information. Affected products include: Python-Jose Project Python-Jose.