CVE-2024-33664

python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
References
Link Resource
https://github.com/mpdavis/python-jose/issues/344 Exploit Issue Tracking Mitigation Vendor Advisory
https://github.com/mpdavis/python-jose/pull/345 Issue Tracking Patch
https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 Exploit Mitigation Third Party Advisory
https://github.com/mpdavis/python-jose/issues/344 Exploit Issue Tracking Mitigation Vendor Advisory
https://github.com/mpdavis/python-jose/pull/345 Issue Tracking Patch
https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:python-jose_project:python-jose:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-04-26 00:15

Updated : 2025-09-02 18:36


NVD link : CVE-2024-33664

Mitre link : CVE-2024-33664

CVE.ORG link : CVE-2024-33664


JSON object : View

Products Affected

python-jose_project

  • python-jose
CWE
CWE-400

Uncontrolled Resource Consumption