CVE-2024-33664

python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
References
Link Resource
https://github.com/mpdavis/python-jose/issues/344 Exploit Issue Tracking Mitigation Vendor Advisory
https://github.com/mpdavis/python-jose/pull/345 Issue Tracking Patch
https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 Exploit Mitigation Third Party Advisory
https://github.com/mpdavis/python-jose/issues/344 Exploit Issue Tracking Mitigation Vendor Advisory
https://github.com/mpdavis/python-jose/pull/345 Issue Tracking Patch
https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:python-jose_project:python-jose:*:*:*:*:*:*:*:*

History

02 Sep 2025, 18:36

Type Values Removed Values Added
CPE cpe:2.3:a:python-jose_project:python-jose:*:*:*:*:*:*:*:*
First Time Python-jose Project python-jose
Python-jose Project
References () https://github.com/mpdavis/python-jose/issues/344 - () https://github.com/mpdavis/python-jose/issues/344 - Exploit, Issue Tracking, Mitigation, Vendor Advisory
References () https://github.com/mpdavis/python-jose/pull/345 - () https://github.com/mpdavis/python-jose/pull/345 - Issue Tracking, Patch
References () https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 - () https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 - Exploit, Mitigation, Third Party Advisory

Information

Published : 2024-04-26 00:15

Updated : 2025-09-02 18:36


NVD link : CVE-2024-33664

Mitre link : CVE-2024-33664

CVE.ORG link : CVE-2024-33664


JSON object : View

Products Affected

python-jose_project

  • python-jose
CWE
CWE-400

Uncontrolled Resource Consumption