Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-52428 in dependency com.nimbusds:nimbus-jose-jwt #2041

Closed
dorszpw opened this issue Feb 20, 2024 · 2 comments
Closed

CVE-2023-52428 in dependency com.nimbusds:nimbus-jose-jwt #2041

dorszpw opened this issue Feb 20, 2024 · 2 comments

Comments

@dorszpw
Copy link

dorszpw commented Feb 20, 2024

MSAL 5.1.0 (most recent so far) has a dependency on com.nimbusds:nimbus-jose-jwt:9.9 which has the following vulnerability:

In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.

https://nvd.nist.gov/vuln/detail/CVE-2023-52428
https://ossindex.sonatype.org/vulnerability/CVE-2023-52428

Mitigation: Please update com.nimbusds:nimbus-jose-jwt dependency to v9.37.2 or newer

@p3dr0rv
Copy link
Collaborator

p3dr0rv commented Feb 21, 2024

thanks for bringing this to our attention.
This will be solved in the next msal release.
#2042
Thanks

@snijsure
Copy link

I take it this CVE is still not addressed based on this commit

#2050

We are currently very old MSAL version 4.4.0 - and our gradle.lockfile is flagging CVE-2023-52428.

Is there version where this issue is fixed?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants