DEBIAN-CVE-2025-65015

Source
https://security-tracker.debian.org/tracker/CVE-2025-65015
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-65015.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-65015
Upstream
Published
2025-11-18T23:15:56.513Z
Modified
2025-11-19T11:17:31.671931Z
Severity
  • 9.2 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In versions from 1.3.3 to before 1.3.5 and from 1.4.0 to before 1.4.2, the ExceededSizeError exception messages are embedded with non-decoded JWT token parts and may cause Python logging to record an arbitrarily large, forged JWT payload. In situations where a misconfigured — or entirely absent — production-grade web server sits in front of a Python web application, an attacker may be able to send arbitrarily large bearer tokens in the HTTP request headers. When this occurs, Python logging or diagnostic tools (e.g., Sentry) may end up processing extremely large log messages containing the full JWT header during the joserfc.jwt.decode() operation. The same behavior also appears when validating claims and signature payload sizes, as the library raises joserfc.errors.ExceededSizeError() with the full payload embedded in the exception message. Since the payload is already fully loaded into memory at this stage, the library cannot prevent or reject it. This issue has been patched in versions 1.3.5 and 1.4.2.

References

Affected packages

Debian:13 / joserfc

Package

Name
joserfc
Purl
pkg:deb/debian/joserfc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.0-1
1.2.0-1
1.2.2-1
1.3.1-1
1.3.2-1
1.3.4-1
1.4.0-1
1.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / joserfc

Package

Name
joserfc
Purl
pkg:deb/debian/joserfc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.0-1
1.2.0-1
1.2.2-1
1.3.1-1
1.3.2-1
1.3.4-1
1.4.0-1
1.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}