Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-74xm-qj29-cq8p

Опубликовано: 25 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication

Impact

Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification.

This attack requires

  • Attacker knows the ICE password.
  • Only take place during PeerConnection handshake.

This attack can be detected by monitoring PeerConnectionState in all versions of Pion WebRTC.

Patches

Users should upgrade to v3.0.15.

The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e

Workarounds

Users should listen for when PeerConnectionState changes to PeerConnectionStateFailed. When it enters this state users should not continue using the PeerConnection.

For more information

If you have any questions or comments about this advisory:

Thank you to https://github.com/Gaukas for discovering this.

Пакеты

Наименование

github.com/pion/webrtc/v3

go
Затронутые версииВерсия исправления

< 3.0.15

3.0.15

EPSS

Процентиль: 28%
0.001
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 5.3
nvd
почти 5 лет назад

Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)

EPSS

Процентиль: 28%
0.001
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-863