{"id":"AZL-77493","summary":"CVE-2025-30204 affecting package cf-cli for versions less than 8.4.0-27","details":"golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer  followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.","modified":"2026-04-21T04:34:17.082428Z","published":"2025-03-21T22:15:26Z","upstream":["CVE-2025-30204"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30204"}],"affected":[{"package":{"name":"cf-cli","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/cf-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.4.0-27"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-77493.json"}}],"schema_version":"1.7.5"}