You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In short, with an attacker controlled p2c value, they can invoke a DoS attack by specifying a very large iteration count. The PBES2-HS256+A128KW, PBES2-HS384+A192KW, and PBES2-HS512+A256KW encryption modes are susceptible to this attack. Here's a demo using the jose library:
Hi there,
This attack was recently described in a Black Hat 2023 presentation: Three New Attacks Against JSON Web Tokens.
In short, with an attacker controlled
p2c
value, they can invoke a DoS attack by specifying a very large iteration count. The PBES2-HS256+A128KW, PBES2-HS384+A192KW, and PBES2-HS512+A256KW encryption modes are susceptible to this attack. Here's a demo using thejose
library:This attack resulted in CVE-2022-36083 in a similar JavaScript JOSE library.
The text was updated successfully, but these errors were encountered: