Search criteria
2 vulnerabilities found for node-jose node module by HackerOne
CVE-2017-16007 (GCVE-0-2017-16007)
Vulnerability from cvelistv5 – Published: 2018-06-04 19:00 – Updated: 2024-09-16 18:23
VLAI?
Summary
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used.
Severity ?
No CVSS data available.
CWE
- CWE-200 - Information Disclosure (CWE-200)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HackerOne | node-jose node module |
Affected:
<0.9.3
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:13:06.846Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nodesecurity.io/advisories/324"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cisco/node-jose"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "node-jose node module",
"vendor": "HackerOne",
"versions": [
{
"status": "affected",
"version": "\u003c0.9.3"
}
]
}
],
"datePublic": "2018-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "Information Disclosure (CWE-200)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-04T18:57:01",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nodesecurity.io/advisories/324"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cisco/node-jose"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"DATE_PUBLIC": "2018-04-26T00:00:00",
"ID": "CVE-2017-16007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "node-jose node module",
"version": {
"version_data": [
{
"version_value": "\u003c0.9.3"
}
]
}
}
]
},
"vendor_name": "HackerOne"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure (CWE-200)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae",
"refsource": "MISC",
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"name": "https://nodesecurity.io/advisories/324",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/324"
},
{
"name": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html",
"refsource": "MISC",
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"name": "https://github.com/cisco/node-jose",
"refsource": "MISC",
"url": "https://github.com/cisco/node-jose"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2017-16007",
"datePublished": "2018-06-04T19:00:00Z",
"dateReserved": "2017-10-29T00:00:00",
"dateUpdated": "2024-09-16T18:23:49.490Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-16007 (GCVE-0-2017-16007)
Vulnerability from nvd – Published: 2018-06-04 19:00 – Updated: 2024-09-16 18:23
VLAI?
Summary
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used.
Severity ?
No CVSS data available.
CWE
- CWE-200 - Information Disclosure (CWE-200)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HackerOne | node-jose node module |
Affected:
<0.9.3
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T20:13:06.846Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://nodesecurity.io/advisories/324"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cisco/node-jose"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "node-jose node module",
"vendor": "HackerOne",
"versions": [
{
"status": "affected",
"version": "\u003c0.9.3"
}
]
}
],
"datePublic": "2018-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "Information Disclosure (CWE-200)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-04T18:57:01",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://nodesecurity.io/advisories/324"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cisco/node-jose"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"DATE_PUBLIC": "2018-04-26T00:00:00",
"ID": "CVE-2017-16007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "node-jose node module",
"version": {
"version_data": [
{
"version_value": "\u003c0.9.3"
}
]
}
}
]
},
"vendor_name": "HackerOne"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for current web browsers and node.js-based servers. node-jose earlier than version 0.9.3 is vulnerable to an invalid curve attack. This allows an attacker to recover the private secret key when JWE with Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) is used."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure (CWE-200)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae",
"refsource": "MISC",
"url": "https://gist.github.com/asanso/fa25685348051ef6a28d49aa0f27a4ae"
},
{
"name": "https://nodesecurity.io/advisories/324",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/324"
},
{
"name": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html",
"refsource": "MISC",
"url": "http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html"
},
{
"name": "https://github.com/cisco/node-jose",
"refsource": "MISC",
"url": "https://github.com/cisco/node-jose"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2017-16007",
"datePublished": "2018-06-04T19:00:00Z",
"dateReserved": "2017-10-29T00:00:00",
"dateUpdated": "2024-09-16T18:23:49.490Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}