Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mwhf-vhr5-7j23

Опубликовано: 12 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.3
CVSS3: 5.8

Описание

whatsapp-api-js fails to validate message's signature

Impact

Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted.

Patches

Patched in version 4.0.3.

Workarounds

It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid.

function doPost(payload, header_signature) { if (whatsapp.verifyRequestSignature(payload.toString(), header_signature) { throw 403; } // Now the payload is correctly verified whatsapp.post(payload); }

References

https://github.com/Secreto31126/whatsapp-api-js/pull/371

Пакеты

Наименование

whatsapp-api-js

npm
Затронутые версииВерсия исправления

>= 4.0.0, < 4.0.3

4.0.3

EPSS

Процентиль: 82%
0.01729
Низкий

5.3 Medium

CVSS4

5.8 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 5.8
nvd
больше 1 года назад

whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.

EPSS

Процентиль: 82%
0.01729
Низкий

5.3 Medium

CVSS4

5.8 Medium

CVSS3

Дефекты

CWE-347