Improper Verification of Cryptographic Signature Affecting com.amazonaws:aws-encryption-sdk-java Open this link in a new tab package, versions [2.0.0, 2.2.0) [,1.9.0)


0.0
medium
  • Attack Complexity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-COMAMAZONAWS-1298624

  • published

    2 Jun 2021

  • disclosed

    1 Jun 2021

  • credit

    Unknown

Introduced: 1 Jun 2021

CWE-347 Open this link in a new tab

How to fix?

Upgrade com.amazonaws:aws-encryption-sdk-java to version 2.2.0, 1.9.0 or higher.

Overview

com.amazonaws:aws-encryption-sdk-java is an AWS Encryption SDK for Java

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature. The ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated.These signatures provide defense in depth and there is no impact on the integrity of decrypted plaintext. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages.

References