dmyers87 / prefect

The Prefect Core workflow engine
https://docs.prefect.io
Apache License 2.0
0 stars 0 forks source link

CVE-2024-48948 (Medium) detected in elliptic-6.5.3.tgz #218

Open mend-for-github-com[bot] opened 1 month ago

mend-for-github-com[bot] commented 1 month ago

CVE-2024-48948 - Medium Severity Vulnerability

Vulnerable Library - elliptic-6.5.3.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/elliptic/package.json

Dependency Hierarchy: - core-1.4.0.tgz (Root Library) - webpack-4.44.2.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.2.1.tgz - :x: **elliptic-6.5.3.tgz** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.

Publish Date: 2024-10-15

URL: CVE-2024-48948

CVSS 3 Score Details (4.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-fc9h-whq2-v747

Release Date: 2024-10-28

Fix Resolution: elliptic - 6.6.0