File tree Expand file tree Collapse file tree 1 file changed +46
-0
lines changed Expand file tree Collapse file tree 1 file changed +46
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : jwe
3+ cve : 2025-54887
4+ ghsa : c7p4-hx26-pr73
5+ url : https://github.com/jwt/ruby-jwe/security/advisories/GHSA-c7p4-hx26-pr73
6+ title : JWE is missing AES-GCM authentication tag validation in encrypted JWE
7+ date : 2025-08-07
8+ description : |
9+ ### Overview
10+
11+ The authentication tag of encrypted JWEs can be brute forced,
12+ which may result in loss of confidentiality for those JWEs and
13+ provide ways to craft arbitrary JWEs.
14+
15+ ### Impact
16+
17+ - JWEs can be modified to decrypt to an arbitrary value
18+ - JWEs can be decrypted by observing parsing differences
19+ - The GCM internal
20+ [GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode)
21+ can be recovered
22+
23+ ### Am I Affected?
24+
25+ You are affected by this vulnerability even if you do not
26+ use an `AES-GCM` encryption algorithm for your JWEs.
27+
28+ ### Patches
29+
30+ The version 1.1.1 fixes the issue by adding the tag length check for the `AES-GCM` algorithm.
31+
32+ **Important:** As the [GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode)
33+ could have leaked, you must rotate the encryption keys after
34+ upgrading to version 1.1.1.
35+
36+ ### References
37+
38+ [Félix Charette talk at NorthSec 2025 about the issue](https://www.youtube.com/watch?v=9IT659uUXfs&t=15830s)
39+ cvss_v3 : 9.1
40+ patched_versions :
41+ - " >= 1.1.1"
42+ related :
43+ url :
44+ - https://github.com/jwt/ruby-jwe/security/advisories/GHSA-c7p4-hx26-pr73
45+ - https://github.com/jwt/ruby-jwe/releases/tag/v1.1.1
46+ - https://github.com/advisories/GHSA-c7p4-hx26-pr73
You can’t perform that action at this time.
0 commit comments