Skip to content

Commit c6cc612

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@43149b5
1 parent 1314447 commit c6cc612

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-54887 (jwe): JWE is missing AES-GCM authentication tag validation
4+
in encrypted JWE'
5+
comments: false
6+
categories:
7+
- jwe
8+
advisory:
9+
gem: jwe
10+
cve: 2025-54887
11+
ghsa: c7p4-hx26-pr73
12+
url: https://github.com/jwt/ruby-jwe/security/advisories/GHSA-c7p4-hx26-pr73
13+
title: JWE is missing AES-GCM authentication tag validation in encrypted JWE
14+
date: 2025-08-07
15+
description: |
16+
### Overview
17+
18+
The authentication tag of encrypted JWEs can be brute forced,
19+
which may result in loss of confidentiality for those JWEs and
20+
provide ways to craft arbitrary JWEs.
21+
22+
### Impact
23+
24+
- JWEs can be modified to decrypt to an arbitrary value
25+
- JWEs can be decrypted by observing parsing differences
26+
- The GCM internal
27+
[GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode)
28+
can be recovered
29+
30+
### Am I Affected?
31+
32+
You are affected by this vulnerability even if you do not
33+
use an `AES-GCM` encryption algorithm for your JWEs.
34+
35+
### Patches
36+
37+
The version 1.1.1 fixes the issue by adding the tag length check for the `AES-GCM` algorithm.
38+
39+
**Important:** As the [GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode)
40+
could have leaked, you must rotate the encryption keys after
41+
upgrading to version 1.1.1.
42+
43+
### References
44+
45+
[Félix Charette talk at NorthSec 2025 about the issue](https://www.youtube.com/watch?v=9IT659uUXfs&t=15830s)
46+
cvss_v3: 9.1
47+
patched_versions:
48+
- ">= 1.1.1"
49+
related:
50+
url:
51+
- https://github.com/jwt/ruby-jwe/security/advisories/GHSA-c7p4-hx26-pr73
52+
- https://github.com/jwt/ruby-jwe/releases/tag/v1.1.1
53+
- https://github.com/advisories/GHSA-c7p4-hx26-pr73
54+
---

0 commit comments

Comments
 (0)