Improper Verification of Cryptographic Signature
Critical severity
GitHub Reviewed
Published
Jun 21, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Jun 16, 2021
Reviewed
Jun 17, 2021
Published to the GitHub Advisory Database
Jun 21, 2021
Last updated
Feb 1, 2023
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the
verifyWithMessage
method oftEnvoyNaClSigningKey
always returnstrue
for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: Intenvoy.js
under theverifyWithMessage
method definition within thetEnvoyNaClSigningKey
class, ensure that the return statement call tothis.verify
ends in.verified
.References