Skip to content

fix: upgrade go-jose/go-jose/v4 to v4.1.4 to fix JWE decryption DoS vulnerability#719

Merged
michaeljguarino merged 1 commit intomainfrom
agent/fix-go-jose-cve-1743803103000
Apr 4, 2026
Merged

fix: upgrade go-jose/go-jose/v4 to v4.1.4 to fix JWE decryption DoS vulnerability#719
michaeljguarino merged 1 commit intomainfrom
agent/fix-go-jose-cve-1743803103000

Conversation

@plural-copilot
Copy link
Copy Markdown
Contributor

@plural-copilot plural-copilot bot commented Apr 4, 2026

Summary

This PR upgrades the github.com/go-jose/go-jose/v4 dependency from v4.1.3 to v4.1.4 to address a denial of service vulnerability.

Vulnerability Details

  • Package: github.com/go-jose/go-jose/v4
  • Previous Version: v4.1.3
  • Fixed Version: v4.1.4
  • Affected Image: ghcr.io/pluralsh/console:0.12.11

Impact

Decrypting a JSON Web Encryption (JWE) object can panic if:

  • The alg field indicates a key wrapping algorithm (those ending in KW, except A128GCMKW, A192GCMKW, and A256GCMKW)
  • The encrypted_key field is empty

The panic occurs when cipher.KeyUnwrap() attempts to allocate a slice with a zero or negative length based on the length of the encrypted_key. This can lead to denial of service.

Changes

  • Updated go.mod: github.com/go-jose/go-jose/v4 v4.1.3 → v4.1.4
  • Updated go.sum with new checksums

Verification

  • ✅ Docker build completed successfully with the updated dependency
  • ✅ No code changes required (indirect dependency update only)

🤖 Generated with Claude Code

…decryption panic vulnerability

This update addresses a denial of service vulnerability in Go JOSE where
decrypting a JSON Web Encryption (JWE) object can panic if the `alg` field
indicates a key wrapping algorithm and the `encrypted_key` field is empty.

The panic occurs in cipher.KeyUnwrap() when attempting to allocate a slice
with a zero or negative length.
Copy link
Copy Markdown
Contributor Author

@plural-copilot plural-copilot bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR was generated by the claude (engine: claude) agent runtime. Here's some useful information you might want to know to evaluate
the ai's perfomance:

Name Details
💬 Prompt Security scanners have found the following vulnerability in our cluster:...
🔗 Run history View run history

@michaeljguarino michaeljguarino added the enhancement New feature or request label Apr 4, 2026
@michaeljguarino michaeljguarino merged commit 8fe1d0e into main Apr 4, 2026
14 of 15 checks passed
@michaeljguarino michaeljguarino deleted the agent/fix-go-jose-cve-1743803103000 branch April 4, 2026 21:35
plural-copilot bot pushed a commit that referenced this pull request Apr 11, 2026
Added verification documentation confirming that the go-jose dependency
has been properly upgraded from v4.1.3 to v4.1.4, addressing the JWE
decryption panic vulnerability.

The fix was previously applied in PR #719 (commit 8fe1d0e).
This verification confirms:
- Dependency is at v4.1.4 in go.mod and go.sum
- Code compiles successfully with the updated dependency
- Docker build completes without errors

Addresses security vulnerability found in Docker image
ghcr.io/pluralsh/console:sha-02db129

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant