Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-41037

Опубликовано: 29 авг. 2023
Источник: nvd
CVSS3: 4.3
EPSS Низкий

Описание

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned verified property, discarding the associated data information, and instead visually trusting the contents of the original message. Since verificationResult.data would always contain the actual signed data, users and apps that check this information are not vulne

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openpgpjs:openpgpjs:*:*:*:*:*:*:*:*
Версия до 4.10.11 (исключая)
cpe:2.3:a:openpgpjs:openpgpjs:*:*:*:*:*:*:*:*
Версия от 5.0.0 (включая) до 5.10.0 (исключая)

EPSS

Процентиль: 23%
0.00076
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 4.3
debian
больше 2 лет назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In ...

CVSS3: 4.3
github
больше 2 лет назад

Cleartext Signed Message Signature Spoofing in openpgp

EPSS

Процентиль: 23%
0.00076
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-347