CVE-2016-9122

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-9122
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9122.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-9122
Aliases
Downstream
Published
2017-03-28T02:59:00Z
Modified
2025-10-15T04:34:51Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the library might mistakenly read protected header values from an attached signature that was different from the one originally validated.

References

Affected packages

Git / github.com/square/go-jose

Affected ranges

Type
GIT
Repo
https://github.com/square/go-jose
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed