Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
- Severity:
- Medium
Description
AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed JWEDecryptionFailed
would be thrown.
Recommendation
Update the jose-browser-runtime
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.11.4
- Patched version(s): 3.11.4
References
Related Issues
- axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL - CVE-2025-27152
- @workos-inc/authkit-remix refresh tokens are logged when the debug flag is enabled - CVE-2024-51753
- @saltcorn/server arbitrary file zip read and download when downloading auto backups - Vulnerability
- lobe-chat implemented an insufficient fix for GHSA-mxhq-xw3g-rphc (CVE-2024-32964) - CVE-2024-47066
- Tags:
- npm
- jose-browser-runtime
Anything's wrong? Let us know Last updated on March 26, 2023