Improper Verification of Cryptographic Signature Affecting tenvoy package, versions <7.0.3


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-TENVOY-1305803
  • published16 Jun 2021
  • disclosed16 Jun 2021
  • creditUnknown

Introduced: 16 Jun 2021

CVE-2021-32685  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade tenvoy to version 7.0.3 or higher.

Overview

tenvoy is a PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature. The verifyWithMessage method of tEnvoyNaClSigningKey always returns true for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid.

CVSS Scores

version 3.1