First published: Tue Jul 25 2017(Updated: )
s2k.js in OpenPGP.js will decrypt arbitrary messages regardless of passphrase for crafted PGP keys which allows remote attackers to bypass authentication if message decryption is used as an authentication mechanism via a crafted symmetrically encrypted PGP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openpetra | <=1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8013 is classified as a high-severity vulnerability due to its potential to bypass authentication mechanisms.
To fix CVE-2015-8013, update OpenPGP.js to version 1.2.1 or later, which addresses the vulnerability.
CVE-2015-8013 enables remote attackers to bypass authentication by decrypting crafted PGP messages without a valid passphrase.
OpenPGP.js versions up to and including 1.2.0 are affected by CVE-2015-8013.
The primary impact of CVE-2015-8013 is the unauthorized decryption of private messages, compromising confidentiality.