Vulnerabilities/

Message Signature Bypass in openpgp

Severity:
High

Description

Versions of openpgp prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type text. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as standalone or timestamp).

Recommendation

Update the openpgp package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
openpgp
Anything's wrong? Let us know Last updated on January 09, 2023

This issue is available in SmartScanner Professional

See Pricing