{"id":"CVE-2024-33664","details":"python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a \"JWT bomb.\" This is similar to CVE-2024-21319.","aliases":["GHSA-cjwg-qfpm-7377","PYSEC-2024-233"],"modified":"2026-04-09T10:08:03.735445Z","published":"2024-04-26T00:15:09.060Z","related":["openSUSE-SU-2024:0149-1","openSUSE-SU-2024:13928-1"],"references":[{"type":"REPORT","url":"https://github.com/mpdavis/python-jose/issues/344"},{"type":"FIX","url":"https://github.com/mpdavis/python-jose/pull/345"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mpdavis/python-jose","events":[{"introduced":"0"},{"last_affected":"e5fcca27712c0ebdeb55d3c3cdad1c6e0f708ac3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.3.0"}]}}],"versions":["0.5.3","0.5.5","0.5.6","0.6.0","0.6.1","0.6.2","0.7.0","1.0.0","1.1.0","1.2.0","1.3.0","1.3.1","1.3.2","1.4.0","2.0.1","2.0.2","3.0.0","3.0.1","3.1.0","3.2.0","3.3.0","v0.1.5","v0.2.0","v0.5.1","v0.5.2","v0.5.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-33664.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}