First published: Thu Aug 22 2019(Updated: )
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openpetra | <=4.1.2 |
https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-9154 is rated as high due to the risk of an attacker passing off unsigned data as signed.
To fix CVE-2019-9154, update OpenPGP.js to version 4.2.0 or later.
CVE-2019-9154 affects unsigned data that can be misrepresented as signed data.
OpenPGP.js versions up to and including 4.1.2 are impacted by CVE-2019-9154.
The main risk associated with CVE-2019-9154 is that it allows attackers to authenticate malicious data as legitimate.