Логотип exploitDog
bind:CVE-2023-41037
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-41037

Количество 3

Количество 3

nvd логотип

CVE-2023-41037

больше 2 лет назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message. Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulne

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-41037

больше 2 лет назад

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-ch3c-v47x-4pgp

больше 2 лет назад

Cleartext Signed Message Signature Spoofing in openpgp

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-41037

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message. Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulne

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-41037

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In ...

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-ch3c-v47x-4pgp

Cleartext Signed Message Signature Spoofing in openpgp

CVSS3: 4.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу