golang-jwt is a Go implementation of JSON Web Tokens. Prior to
5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 21 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2. | |
Title | jwt-go allows excessive memory allocation during header parsing | |
Weaknesses | CWE-405 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-21T21:42:01.382Z
Updated: 2025-03-24T14:10:35.776Z
Reserved: 2025-03-18T18:15:13.849Z
Link: CVE-2025-30204

Updated: 2025-03-24T14:10:25.565Z

Status : Received
Published: 2025-03-21T22:15:26.420
Modified: 2025-03-21T22:15:26.420
Link: CVE-2025-30204
