Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/square/go-jose
  4. ›
  5. CVE-2016-9121

CVE-2016-9121: Inadequate Encryption Strength

June 23, 2021 (updated February 16, 2023)

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.

References

  • github.com/advisories/GHSA-86r9-39j9-99wp
  • github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
  • hackerone.com/reports/164590
  • nvd.nist.gov/vuln/detail/CVE-2016-9121
  • pkg.go.dev/vuln/GO-2020-0010
  • www.openwall.com/lists/oss-security/2016/11/03/1

Code Behaviors & Features

Detect and mitigate CVE-2016-9121 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.0.4

Fixed versions

  • v1.0.4

Solution

Upgrade to version 1.0.4 or above.

Impact 9.1 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-326: Inadequate Encryption Strength

Source file

go/github.com/square/go-jose/CVE-2016-9121.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:32 +0000.