Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33664: n/a

0
Medium
VulnerabilityCVE-2024-33664cvecve-2024-33664
Published: Thu Apr 25 2024 (04/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:58:35 UTC

Technical Analysis

CVE-2024-33664 is a denial of service vulnerability affecting the python-jose library, versions through 3.3.0. The issue arises during the decoding of JSON Web Encryption (JWE) tokens that are crafted with a very high compression ratio. When such a token is processed, the decompression step consumes excessive CPU and memory resources, potentially exhausting system resources and causing the application or service to become unresponsive or crash. This attack vector is commonly referred to as a "JWT bomb," analogous to the well-known "zip bomb" attack pattern. The vulnerability stems from insufficient validation or limits on decompression resource usage during token processing. Since python-jose is a widely used Python library for handling JWTs and JWE tokens, this vulnerability can impact any application relying on it for secure token decoding. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack can be launched remotely without authentication or user interaction and impacts availability only, without compromising confidentiality or integrity. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-400, indicating uncontrolled resource consumption leading to denial of service.

Potential Impact

The primary impact of CVE-2024-33664 is denial of service through resource exhaustion during JWE token decoding. Organizations using python-jose in their authentication, authorization, or secure communication workflows may experience application slowdowns, crashes, or outages if targeted with crafted tokens. This can disrupt service availability, degrade user experience, and potentially cause cascading failures in dependent systems. While confidentiality and integrity of data are not directly affected, the availability impact can be significant for high-traffic or security-critical applications. Attackers can exploit this vulnerability remotely without needing credentials or user interaction, increasing the risk of automated or large-scale attacks. The lack of known exploits currently reduces immediate risk, but the presence of a public CVE and similarity to previous JWT bomb vulnerabilities means attackers may develop exploits soon. Organizations relying on python-jose should consider this vulnerability a moderate risk to service continuity.

Mitigation Recommendations

To mitigate CVE-2024-33664, organizations should: 1) Monitor for updates from the python-jose maintainers and apply patches promptly once available. 2) Implement input validation and size limits on incoming JWE tokens to reject tokens with suspiciously high compression ratios or excessively large payloads before decoding. 3) Use resource limiting techniques such as CPU timeouts, memory limits, or sandboxing around token decoding operations to prevent resource exhaustion from impacting the entire application. 4) Employ rate limiting and anomaly detection on endpoints that accept JWE tokens to detect and block potential abuse patterns. 5) Consider alternative JWT/JWE libraries with built-in protections against decompression bombs if patching is delayed. 6) Conduct security testing and fuzzing of token processing components to identify similar resource exhaustion vectors. These steps go beyond generic advice by focusing on proactive resource management and input validation specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c43b7ef31ef0b561b27

Added to database: 2/25/2026, 9:40:19 PM

Last enriched: 2/28/2026, 2:58:35 AM

Last updated: 4/12/2026, 3:35:04 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses