First published: Tue Apr 06 2021(Updated: )
Improper Certificate Validation in phpseclib
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpseclib/phpseclib | <2.0.31>=3.0.0<3.0.7 | |
composer/phpseclib/phpseclib | <2.0.31 | 2.0.31 |
composer/phpseclib/phpseclib | >=3.0.0<3.0.7 | 3.0.7 |
phpseclib | <2.0.31 | |
phpseclib | >=3.0<3.0.7 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-30130.
The title of this vulnerability is 'Improper Certificate Validation in phpseclib'.
This vulnerability refers to phpseclib before 2.0.31 and 3.x before 3.0.7 mishandling RSA PKCS#1 v1.5 signature verification.
The severity of CVE-2021-30130 is high with a CVSS score of 7.5.
The affected software versions include phpseclib 2.0.0 up to exclusive 2.0.31 and phpseclib 3.0.0 from inclusive up to exclusive 3.0.7.
To fix this vulnerability, update your phpseclib package to version 2.0.31 or version 3.0.7.