{"id":"GO-2023-1859","summary":"Padding oracle vulnerability in github.com/lestrrat-go/jwx","details":"AES-CBC decryption is vulnerable to a timing attack which may permit an attacker to recover the plaintext of JWE data.","aliases":["GHSA-rm8v-mxj3-5rmq"],"modified":"2026-03-17T04:43:18.812859Z","published":"2023-06-22T16:36:11Z","database_specific":{"url":"https://pkg.go.dev/vuln/GO-2023-1859","review_status":"REVIEWED"},"references":[{"type":"FIX","url":"https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103"},{"type":"FIX","url":"https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6"}],"affected":[{"package":{"name":"github.com/lestrrat-go/jwx","ecosystem":"Go","purl":"pkg:golang/github.com/lestrrat-go/jwx"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.2.26"}]}],"ecosystem_specific":{"imports":[{"symbols":["Hmac.Open","unpad"],"path":"github.com/lestrrat-go/jwx/jwe/internal/aescbc"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1859.json"}},{"package":{"name":"github.com/lestrrat-go/jwx/v2","ecosystem":"Go","purl":"pkg:golang/github.com/lestrrat-go/jwx/v2"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.0.11-0.20230614080639-c8b6bec919a1"}]}],"ecosystem_specific":{"imports":[{"symbols":["Hmac.Open","unpad"],"path":"github.com/lestrrat-go/jwx/v2/jwe/internal/aescbc"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1859.json"}}],"schema_version":"1.7.5"}