Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfmf-q43v-2ffj

Опубликовано: 23 авг. 2019
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Improper Key Verification in openpgp

Versions of openpgp prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The openpgp package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.

Recommendation

Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the High-Level API Changes section of the openpgp 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0

Пакеты

Наименование

openpgp

npm
Затронутые версииВерсия исправления

<= 4.1.2

4.2.0

EPSS

Процентиль: 59%
0.00389
Низкий

7.5 High

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed.

CVSS3: 7.5
debian
больше 6 лет назад

Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1 ...

EPSS

Процентиль: 59%
0.00389
Низкий

7.5 High

CVSS3

Дефекты

CWE-347