{"vulnerability": "cve-2024-2818", "sightings": [{"uuid": "93f1001f-2322-46e0-accf-164fc8455283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28180", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4311", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28180\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: ### Impact\nAn attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.\n\n### Patches\nThe problem is fixed in the following packages and versions:\n- github.com/go-jose/go-jose/v4 version 4.0.1\n- github.com/go-jose/go-jose/v3 version 3.0.3\n- gopkg.in/go-jose/go-jose.v2 version 2.6.3\n\nThe problem will not be fixed in the following package because the package is archived:\n- gopkg.in/square/go-jose.v2\n\ud83d\udccf Published: 2024-03-07T22:54:44Z\n\ud83d\udccf Modified: 2025-02-13T19:07:25Z\n\ud83d\udd17 References:\n1. https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g\n2. https://nvd.nist.gov/vuln/detail/CVE-2024-28180\n3. https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298\n4. https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a\n5. https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502\n6. https://github.com/go-jose/go-jose\n7. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ\n8. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG\n9. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ\n10. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5\n11. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY\n12. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS\n13. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG\n14. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY\n15. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH", "creation_timestamp": "2025-02-13T19:15:35.000000Z"}, {"uuid": "93b46d39-2c44-4b5a-a98f-d1fa99fda2b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28186", "type": "seen", "source": "https://t.me/ctinow/206178", "content": "https://ift.tt/0HEzONM\nCVE-2024-28186", "creation_timestamp": "2024-03-12T21:26:44.000000Z"}, {"uuid": "59547e95-eda0-4373-8500-3150485dfedb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28184", "type": "seen", "source": "https://t.me/ctinow/203729", "content": "https://ift.tt/wXQGEpJ\nCVE-2024-28184", "creation_timestamp": "2024-03-09T02:31:51.000000Z"}, {"uuid": "6bc2e5ad-2bcd-488e-96fa-2308b88d884b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28180", "type": "seen", "source": "https://t.me/ctinow/203728", "content": "https://ift.tt/3BFPK8y\nCVE-2024-28180", "creation_timestamp": "2024-03-09T02:31:50.000000Z"}, {"uuid": "dbca9a58-a992-4643-b6c7-af7d93e23084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28184", "type": "seen", "source": "https://t.me/ctinow/203725", "content": "https://ift.tt/wXQGEpJ\nCVE-2024-28184", "creation_timestamp": "2024-03-09T02:26:41.000000Z"}, {"uuid": "bc6b1e1c-0e64-4c23-9662-2799b6826a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28180", "type": "seen", "source": "https://t.me/ctinow/203724", "content": "https://ift.tt/3BFPK8y\nCVE-2024-28180", "creation_timestamp": "2024-03-09T02:26:41.000000Z"}, {"uuid": "98cb4663-8887-468a-9d4b-39c6d26ed3ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28185", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "3e3f1265-0bbf-4a6f-b5c9-8834d585e1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28189", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "12265963-b42e-493b-ada1-8d64f36791f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28185", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/judge0_sandbox_escape_cve_2024_28189.rb", "content": "", "creation_timestamp": "2024-11-20T22:41:34.000000Z"}, {"uuid": "0d2331b6-8325-410f-ba76-54c70cd90c37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28187", "type": "seen", "source": "https://t.me/ctinow/205067", "content": "https://ift.tt/B18RS0X\nCVE-2024-28187", "creation_timestamp": "2024-03-11T21:26:52.000000Z"}, {"uuid": "528c3a68-48c8-47c2-8448-707d34b7f928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28186", "type": "seen", "source": "https://t.me/ctinow/206166", "content": "https://ift.tt/0HEzONM\nCVE-2024-28186", "creation_timestamp": "2024-03-12T21:22:13.000000Z"}, {"uuid": "6a808c0f-004b-46ee-8820-b6e1883bae4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28187", "type": "seen", "source": "https://t.me/ctinow/205063", "content": "https://ift.tt/B18RS0X\nCVE-2024-28187", "creation_timestamp": "2024-03-11T21:26:47.000000Z"}, {"uuid": "79008ebd-ef99-4277-a2fd-0782412ed834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28180", "type": "seen", "source": "https://t.me/ctinow/204351", "content": "https://ift.tt/KX4uHgF\nCVE-2024-28180", "creation_timestamp": "2024-03-10T21:46:27.000000Z"}, {"uuid": "1f341fa7-f03f-4915-aa51-f15db5e34ff3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28185", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "531e8b14-2749-4d95-b220-2a8d0a4baf03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28189", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "2f19fe0c-961e-4407-a97b-ce66529ac6d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28185", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "58d34aaa-0333-46ef-ae35-eba65907dfe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28189", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "b00ee712-c7a3-471f-9e0d-bd30f7a9afe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28182", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6990", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)\nURL\uff1ahttps://github.com/lockness-Ko/CVE-2024-27316\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-09T08:14:27.000000Z"}, {"uuid": "4f8eba15-3946-4d72-9559-7ace7bf78189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28182", "type": "seen", "source": "https://t.me/arpsyndicate/4402", "content": "#ExploitObserverAlert\n\nCVE-2024-28182\n\nDESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-28182. nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-04-09T19:22:10.000000Z"}, {"uuid": "1929e4e9-9c5b-4598-a78a-b79ff23de744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28180", "type": "seen", "source": "https://t.me/arpsyndicate/4947", "content": "#ExploitObserverAlert\n\nCVE-2024-28180\n\nDESCRIPTION: Exploit Observer has 34 entries in 5 file formats related to CVE-2024-28180. Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.\n\nFIRST-EPSS: 0.000450000\nARPS-PRIORITY: 0.7524723", "creation_timestamp": "2024-05-19T08:52:26.000000Z"}, {"uuid": "58e2eef1-1f7b-40e2-9736-c916aa3169cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28181", "type": "seen", "source": "https://t.me/ctinow/208061", "content": "https://ift.tt/rLDyJtG\nCVE-2024-28181", "creation_timestamp": "2024-03-14T19:27:05.000000Z"}, {"uuid": "c457fe5b-b886-49a5-8019-381506cec884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28181", "type": "seen", "source": "https://t.me/ctinow/208055", "content": "https://ift.tt/rLDyJtG\nCVE-2024-28181", "creation_timestamp": "2024-03-14T19:21:26.000000Z"}, {"uuid": "bda1f4b2-5546-497c-8ca9-4084f4d25823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28189", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/judge0_sandbox_escape_cve_2024_28189.rb", "content": "", "creation_timestamp": "2024-11-20T22:41:34.000000Z"}]}