Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-47934

Опубликовано: 19 мая 2025
Источник: nvd
EPSS Низкий

Описание

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either openpgp.verify or openpgp.decrypt, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using openpgp.verify) and signed-and-encrypted messages (using openpgp.decrypt with verificationKeys) to be spoofed, since both functions return extracted data that may not match the data that was originally signed. Detached signature verifications are not affected, as no signed data is returned in that case. In order to spoof a message, the attacker needs a single valid message signature (inline or detached) as well as the plaintext data that was legitimately signed, and can then construct an inline-signed message or signed-and-encrypted message with any

EPSS

Процентиль: 6%
0.00025
Низкий

Дефекты

CWE-347

Связанные уязвимости

debian
9 месяцев назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Sta ...

github
9 месяцев назад

OpenPGP.js's message signature verification can be spoofed

CVSS3: 7.5
fstec
9 месяцев назад

Уязвимость функций verify() и decrypt() npm библиотеки OpenPGP, позволяющая нарушителю получить действительную подпись сообщения и раскрыть защищаемую информацию

EPSS

Процентиль: 6%
0.00025
Низкий

Дефекты

CWE-347