First published: Sat Aug 20 2022(Updated: )
Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn't check the RSA private key length before RSA-OAEP decryption. This allows attackers to cause a Denial of Service via a crafted JWE (JSON Web Encryption) token.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rhonabwy Project | >=0.9.99<1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38493 is classified as a medium severity vulnerability due to its potential for Denial of Service attacks.
To remediate CVE-2022-38493, upgrade Rhonabwy to version 1.1.7 or later where the RSA private key length check is implemented.
CVE-2022-38493 allows attackers to execute a Denial of Service attack through a crafted JWE token.
CVE-2022-38493 affects Rhonabwy versions from 0.9.99 up to, but not including, 1.1.7.
The vulnerability in CVE-2022-38493 arises from the lack of RSA private key length validation during RSA-OAEP decryption.