logo

CVE-2021-32685 tenvoy

Package

Manager: npm
Name: tenvoy
Vulnerable Version: >=0 <7.0.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00177 pctl0.39543

Details

Improper Verification of Cryptographic Signature tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`.

Metadata

Created: 2021-06-21T17:12:13Z
Modified: 2021-06-17T18:47:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-5w25-hxp5-h8c9/GHSA-5w25-hxp5-h8c9.json
CWE IDs: ["CWE-347"]
Alternative ID: GHSA-5w25-hxp5-h8c9
Finding: F163
Auto approve: 1