Описание
An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.
Ссылки
- Release Notes
- Release Notes
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.0 (исключая)
cpe:2.3:a:iofinnet:tss-lib:*:*:*:*:*:*:*:*
EPSS
Процентиль: 22%
0.00072
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-294
CWE-294
Связанные уязвимости
CVSS3: 6.8
github
почти 3 года назад
IO FinNet tss-lib vulnerable to replay attacks involving proofs
EPSS
Процентиль: 22%
0.00072
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-294
CWE-294