python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
References
| Link | Resource |
|---|---|
| https://github.com/mpdavis/python-jose/issues/344 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://github.com/mpdavis/python-jose/pull/345 | Issue Tracking Patch |
| https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 | Exploit Mitigation Third Party Advisory |
| https://github.com/mpdavis/python-jose/issues/344 | Exploit Issue Tracking Mitigation Vendor Advisory |
| https://github.com/mpdavis/python-jose/pull/345 | Issue Tracking Patch |
| https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 | Exploit Mitigation Third Party Advisory |
Configurations
History
02 Sep 2025, 18:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:python-jose_project:python-jose:*:*:*:*:*:*:*:* | |
| First Time |
Python-jose Project python-jose
Python-jose Project |
|
| References | () https://github.com/mpdavis/python-jose/issues/344 - Exploit, Issue Tracking, Mitigation, Vendor Advisory | |
| References | () https://github.com/mpdavis/python-jose/pull/345 - Issue Tracking, Patch | |
| References | () https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664 - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2024-04-26 00:15
Updated : 2025-09-02 18:36
NVD link : CVE-2024-33664
Mitre link : CVE-2024-33664
CVE.ORG link : CVE-2024-33664
JSON object : View
Products Affected
python-jose_project
- python-jose
CWE
CWE-400
Uncontrolled Resource Consumption
