Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qwqc-28w3-fww6

Опубликовано: 23 авг. 2019
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Message Signature Bypass in openpgp

Versions of openpgp prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type text. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as standalone or timestamp). For example, an attacker that captures a standalone signature packet from a victim can construct arbitrary signed messages that would be verified correctly.

Recommendation

Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the High-Level API Changes section of the openpgp 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0

Пакеты

Наименование

openpgp

npm
Затронутые версииВерсия исправления

<= 4.1.2

4.2.0

EPSS

Процентиль: 58%
0.00362
Низкий

7.5 High

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature.

CVSS3: 7.5
debian
больше 6 лет назад

Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1 ...

EPSS

Процентиль: 58%
0.00362
Низкий

7.5 High

CVSS3

Дефекты

CWE-347