GHSA-6gvq-jcmp-8959

Suggest an improvement
Source
https://github.com/advisories/GHSA-6gvq-jcmp-8959
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-6gvq-jcmp-8959/GHSA-6gvq-jcmp-8959.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6gvq-jcmp-8959
Aliases
Published
2025-12-16T00:43:52Z
Modified
2025-12-20T03:08:08.211816Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
Summary
ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay
Details

Impact

A cryptographic semantic binding flaw in ALTCHA libraries allows challenge payload splicing, which may enable replay attacks. The HMAC signature does not unambiguously bind challenge parameters to the nonce, allowing an attacker to reinterpret a valid proof-of-work submission with a modified expiration value. This may allow previously solved challenges to be reused beyond their intended lifetime, depending on server-side replay handling and deployment assumptions.

The vulnerability primarily impacts abuse-prevention mechanisms such as rate limiting and bot mitigation. It does not directly affect data confidentiality or integrity.

Patches

This issue has been addressed by enforcing explicit semantic separation between challenge parameters and the nonce during HMAC computation.

Users are advised to upgrade to patched versions.

Workarounds

As a mitigation, implementations may append a delimiter to the end of the salt value prior to HMAC computation (for example, <salt>?expires=<time>&). This prevents ambiguity between parameters and the nonce and is backward-compatible with existing implementations, as the delimiter is treated as a standard URL parameter separator.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-115",
        "CWE-347"
    ],
    "nvd_published_at": "2025-12-16T01:15:53Z",
    "github_reviewed_at": "2025-12-16T00:43:52Z",
    "severity": "MODERATE"
}
References

Affected packages

Go

github.com/altcha-org/altcha-lib-go

Package

Name
github.com/altcha-org/altcha-lib-go
View open source insights on deps.dev
Purl
pkg:golang/github.com/altcha-org/altcha-lib-go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0

Hex

altcha

Package

Name
altcha
Purl
pkg:hex/altcha

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0

Affected versions

0.*

0.1.0
0.2.0

Maven

org.altcha:altcha

Package

Name
org.altcha:altcha
View open source insights on deps.dev
Purl
pkg:maven/org.altcha/altcha

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

1.*

1.1.0
1.1.1
1.1.2
1.2.0

npm

altcha-lib

Package

Name
altcha-lib
View open source insights on deps.dev
Purl
pkg:npm/altcha-lib

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.1

Packagist

altcha-org/altcha

Package

Name
altcha-org/altcha
Purl
pkg:composer/altcha-org/altcha

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.1

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0

PyPI

altcha

Package

Name
altcha
View open source insights on deps.dev
Purl
pkg:pypi/altcha

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0

Affected versions

0.*

0.1.0
0.1.2
0.1.3
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8
0.1.9
0.2.0

RubyGems

altcha

Package

Name
altcha
Purl
pkg:gem/altcha

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0

Affected versions

0.*

0.1.0
0.2.0
0.2.1