Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6cgh-hjpw-q3gq

Опубликовано: 02 июл. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Utils.readChallengeTx does not verify the server account signature

The Utils.readChallengeTx function used in SEP-10 Stellar Web Authentication states in its function documentation that it reads and validates the challenge transaction including verifying that the serverAccountID has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.

Applications that also used Utils.verifyChallengeTxThreshold or Utils.verifyChallengeTxSigners to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.

Applications calling Utils.readChallengeTx should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.

Пакеты

Наименование

stellar-sdk

npm
Затронутые версииВерсия исправления

< 8.2.3

8.2.3

EPSS

Процентиль: 21%
0.00069
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-347

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

js-stellar-sdk is a Javascript library for communicating with a Stellar Horizon server. The `Utils.readChallengeTx` function used in SEP-10 Stellar Web Authentication states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. In js-stellar-sdk before version 8.2.3, the function does not verify that the server has signed the transaction. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to version 8.2.3, the first version with a patch for this vulnerability, to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.

EPSS

Процентиль: 21%
0.00069
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-347