CVE-2017-12974
HIGHConnect2id Nimbus Jose+jwt < 4.36 - Signature Verification Bypass
Title source: ruleDescription
Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/217/explicit-check-for-ec-public-key-on-curve
Release Notes, Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/CHANGELOG.txt
Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/f3a7a801f0c6b078899fed9226368eb7b44e2b2f
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
Scores
CVSS v3
7.5
EPSS
0.0014
EPSS Percentile
33.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-347
Status
published
Products (50)
com.nimbusds/nimbus-jose-jwt
0 - 4.36Maven
connect2id/nimbus_jose\+jwt
1.0
connect2id/nimbus_jose\+jwt
1.1
connect2id/nimbus_jose\+jwt
1.2
connect2id/nimbus_jose\+jwt
1.3
connect2id/nimbus_jose\+jwt
1.4
connect2id/nimbus_jose\+jwt
1.5
connect2id/nimbus_jose\+jwt
1.6
connect2id/nimbus_jose\+jwt
1.7
connect2id/nimbus_jose\+jwt
1.8
... and 40 more
Published
Aug 20, 2017
Tracked Since
Feb 18, 2026