CVE-2019-17195
CRITICALConnect2id Nimbus Jose+jwt < 7.9 - Improper Exception Handling
Title source: ruleDescription
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
Exploits (1)
References (16)
Core 16
Core References
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41%40%3Ccommon-issues.hadoop.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d%40%3Ccommon-dev.hadoop.apache.org%3E
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2020.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpujan2021.html
Release Notes, Third Party Advisory x_refsource_confirm
https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt
Release Notes, Vendor Advisory x_refsource_confirm
https://connect2id.com/blog/nimbus-jose-jwt-7-9
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98%40%3Cdev.avro.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a%40%3Cdev.avro.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b%40%3Ccommits.druid.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2%40%3Ccommits.druid.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d%40%3Ccommits.druid.apache.org%3E
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuApr2021.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com//security-alerts/cpujul2021.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuoct2021.html
Not Applicable x_refsource_misc
https://www.oracle.com/security-alerts/cpujan2022.html
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2022.html
Scores
CVSS v3
9.8
EPSS
0.0427
EPSS Percentile
88.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-755
Status
published
Products (19)
apache/hadoop
3.2.1
com.nimbusds/nimbus-jose-jwt
0 - 7.9Maven
connect2id/nimbus_jose\+jwt
< 7.9
oracle/communications_cloud_native_core_security_edge_protection_proxy
1.7.0
oracle/communications_pricing_design_center
12.0.0.3.0
oracle/data_integrator
12.2.1.4.0
oracle/enterprise_manager_base_platform
13.4.0.0
oracle/healthcare_data_repository
8.1.0
oracle/insurance_policy_administration
11.0 - 11.3.1
oracle/jd_edwards_enterpriseone_orchestrator
< 9.2.5.3
... and 9 more
Published
Oct 15, 2019
Tracked Since
Feb 18, 2026