GHSA-q3vw-4jx3-rrr2

Suggest an improvement
Source
https://github.com/advisories/GHSA-q3vw-4jx3-rrr2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-q3vw-4jx3-rrr2/GHSA-q3vw-4jx3-rrr2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-q3vw-4jx3-rrr2
Published
2020-09-23T17:20:09Z
Modified
2022-09-19T22:54:00Z
Summary
personnummer/java vulnerable to Improper Input Validation
Details

This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.

The vulnerability is determined to be low severity.

Impact

This vulnerability impacts users who rely on the for last digits of personnummer to be a real personnummer.

Patches

The issue have been patched in all repositories. The following versions should be updated to as soon as possible:

C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1

If you are using any of the earlier packages, please update to latest.

Workarounds

The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x.

For more information

If you have any questions or comments about this advisory: * Open an issue in Personnummer Meta * Email us at Personnummer Email

References

Affected packages

Maven / dev.personnummer:personnummer

Package

Name
dev.personnummer:personnummer
View open source insights on deps.dev
Purl
pkg:maven/dev.personnummer/personnummer

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0