GHSA-PGCR-7WM4-MCV6
Vulnerability from github – Published: 2019-06-04 15:42 – Updated: 2021-08-04 21:28
VLAI?
Summary
Sensitive Data Exposure in pem
Details
Versions of pem before 1.13.2 expose sensitive data when the readPkcs12 is used.
The readPkcs12 function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system.
Recommendation
Update to version 1.13.2 or later.
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "pem"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2019-06-04T15:41:30Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. \n\nThe `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system.\n\n\n\n## Recommendation\n\nUpdate to version 1.13.2 or later.",
"id": "GHSA-pgcr-7wm4-mcv6",
"modified": "2021-08-04T21:28:00Z",
"published": "2019-06-04T15:42:45Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/Dexus/pem/pull/217"
},
{
"type": "WEB",
"url": "https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-PEM-173687"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/723"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Sensitive Data Exposure in pem"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…