Description
go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
References (3)
Core 3
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
Permissions Required x_refsource_misc
https://hackerone.com/reports/164590
Mailing List, Patch, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2016/11/03/1
Scores
CVSS v3
9.1
EPSS
0.0019
EPSS Percentile
40.3%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-326
Status
published
Products (4)
go-jose_project/go-jose
< 1.0.3
n/a/Go JOSE All versions before 1.0.4
Go JOSE All versions before 1.0.4
square/go-jose
0 - 1.0.4Go
square/go-jose.v1
0 - 1.0.4Go
Published
Mar 28, 2017
Tracked Since
Feb 18, 2026