### [CVE-2016-9121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9121) ![](https://img.shields.io/static/v1?label=Product&message=Go%20JOSE%20All%20versions%20before%201.0.4&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Go%20JOSE%20All%20versions%20before%201.0.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cryptographic%20Issue&color=brightgreen) ### Description go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack. ### POC #### Reference - https://hackerone.com/reports/164590 #### Github No PoCs found on GitHub currently.