python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
References
| Link | Resource |
|---|---|
| https://github.com/mpdavis/python-jose/issues/344 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://github.com/mpdavis/python-jose/pull/345 | Issue Tracking Patch |
| https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 | Exploit Mitigation Third Party Advisory |
| https://github.com/mpdavis/python-jose/issues/344 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://github.com/mpdavis/python-jose/pull/345 | Issue Tracking Patch |
| https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 | Exploit Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-26 00:15
Updated : 2025-09-02 18:36
NVD link : CVE-2024-33664
Mitre link : CVE-2024-33664
CVE.ORG link : CVE-2024-33664
JSON object : View
Products Affected
python-jose_project
- python-jose
CWE
CWE-400
Uncontrolled Resource Consumption
