CVE-2017-12972
HIGHConnect2id Nimbus Jose+jwt < 4.39 - Data Authenticity Bypass
Title source: ruleDescription
In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/224/byte-to-bit-overflow-in-cbc
Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/0d2bd649ea386539220d4facfe1f65eb1dadb86c
Release Notes, Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Scores
CVSS v3
7.5
EPSS
0.0016
EPSS Percentile
36.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-345
Status
published
Products (50)
com.nimbusds/nimbus-jose-jwt
0 - 4.39Maven
connect2id/nimbus_jose\+jwt
1.0
connect2id/nimbus_jose\+jwt
1.1
connect2id/nimbus_jose\+jwt
1.2
connect2id/nimbus_jose\+jwt
1.3
connect2id/nimbus_jose\+jwt
1.4
connect2id/nimbus_jose\+jwt
1.5
connect2id/nimbus_jose\+jwt
1.6
connect2id/nimbus_jose\+jwt
1.7
connect2id/nimbus_jose\+jwt
1.8
... and 40 more
Published
Aug 20, 2017
Tracked Since
Feb 18, 2026