{ "schema_version": "1.4.0", "id": "GHSA-77jf-fjjf-xcww", "modified": "2021-07-27T21:15:18Z", "published": "2019-08-23T21:42:22Z", "aliases": [ "CVE-2019-9155" ], "summary": "Invalid Curve Attack in openpgp", "details": "Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.\n\n\n## Recommendation\n\nUpgrade to version 4.3.0 or later.\nIf you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "openpgp" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.3.0" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9155" }, { "type": "WEB", "url": "https://github.com/openpgpjs/openpgpjs/pull/853" }, { "type": "WEB", "url": "https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e" }, { "type": "WEB", "url": "https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0" }, { "type": "WEB", "url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JS-OPENPGP-460225" }, { "type": "WEB", "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/1159" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html" } ], "database_specific": { "cwe_ids": [ "CWE-327" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2019-08-23T21:39:35Z", "nvd_published_at": "2019-08-22T16:15:00Z" } }