You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// set the expected GCM-mode authentication tag
if (EVP_CIPHER_CTX_ctrl(ctx, CJOSE_EVP_CTRL_GCM_SET_TAG, jwe->enc_auth_tag.raw_len, jwe->enc_auth_tag.raw) != 1)
zandbelt
changed the title
incorrect Authentication Tag length usage in AES GCM decryption
SECURITY VULNERABILITY: incorrect Authentication Tag length usage in AES GCM decryption
Jul 12, 2023
NOTE THAT AES GCM DECRYPTION IS SEVERELY BROKEN FOR ALL VERSIONS OF CJOSE < 0.6.2.2
The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE, see: https://github.com/cisco/cjose/blob/0.6.1/src/jwe.c#L1228-L1229:
However, the spec https://datatracker.ietf.org/doc/html/rfc7518#section-4.7 says that a fixed length of 16 octets must be applied:
Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly.
See also: CVE-2023-37464 and GHSA-3rhg-3gf2-6xgj
The text was updated successfully, but these errors were encountered: