GHSA-w45j-f832-hxvh

Suggest an improvement
Source
https://github.com/advisories/GHSA-w45j-f832-hxvh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w45j-f832-hxvh/GHSA-w45j-f832-hxvh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w45j-f832-hxvh
Aliases
Related
Published
2022-05-25T19:26:09Z
Modified
2023-11-08T04:09:11.243676Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Pion/DLTS Accepts Client Certificates Without CertificateVerify
Details

Impact

A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it.

This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5

Patches

Upgrade to Pion DTLS v2.1.5

Workarounds

No workarounds available, upgrade to Pion DTLS v2.1.5

References

Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.

For more information

If you have any questions or comments about this advisory: * Open an issue in Pion DTLS * Email us at team@pion.ly

Database specific
{
    "nvd_published_at": "2022-05-21T00:15:00Z",
    "cwe_ids": [
        "CWE-295"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-05-25T19:26:09Z"
}
References

Affected packages

Go / github.com/pion/dtls

Package

Name
github.com/pion/dtls
View open source insights on deps.dev
Purl
pkg:golang/github.com/pion/dtls

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.5

Go / github.com/pion/dtls/v2

Package

Name
github.com/pion/dtls/v2
View open source insights on deps.dev
Purl
pkg:golang/github.com/pion/dtls/v2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.5