First published: Sun Feb 11 2024(Updated: )
Connect2id Nimbus-JOSE-JWT is vulnerable to a denial of service, caused by improper validation of user requests by the PasswordBasedDecrypter (PBKDF2) component. By sending a specially crafted request using a large JWE p2c header, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.nimbusds:nimbus-jose-jwt | <9.37.2 | 9.37.2 |
Connect2id Nimbus JOSE+JWT | <9.37.2 | |
IBM Planning Analytics | <=2.1 | |
IBM Planning Analytics | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52428 has been assessed to pose a moderate severity risk due to its potential for denial of service.
To fix CVE-2023-52428, users should upgrade to version 9.37.2 or later of the com.nimbusds:nimbus-jose-jwt package.
CVE-2023-52428 affects the PasswordBasedDecrypter (PBKDF2) component within the Connect2id Nimbus-JOSE-JWT library.
Yes, CVE-2023-52428 can be exploited remotely by sending specially crafted requests with a large JWE p2c header.
Software such as Connect2id Nimbus JOSE+JWT and IBM Planning Analytics versions 2.0 and 2.1 should be monitored for CVE-2023-52428.