The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/latchset/jwcrypto/issues/65 | issue tracking vendor advisory |
https://github.com/latchset/jwcrypto/pull/66 | issue tracking patch |
http://www.securityfocus.com/bid/92729 | vdb entry third party advisory broken link |
https://github.com/latchset/jwcrypto/releases/tag/v0.3.2 | patch vendor advisory |
https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba | issue tracking patch vendor advisory |