GHSA-7qcx-4p32-qcmx

Suggest an improvement
Source
https://github.com/advisories/GHSA-7qcx-4p32-qcmx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-7qcx-4p32-qcmx/GHSA-7qcx-4p32-qcmx.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-7qcx-4p32-qcmx
Aliases
Related
Published
2022-05-25T19:34:20Z
Modified
2023-11-01T04:58:43.371901Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Missing Cryptographic Step in cassproject
Details

Impact

CaSS Library, (npm:cassproject) has a missing cryptographic step when storing cryptographic keys that can allow a server administrator access to an account’s cryptographic keys. This affects CaSS servers using standalone username/password authentication, which uses a method that expects e2e cryptographic security of authorization credentials.

Patches

The issue has been patched in 1.5.8, however, the vulnerable accounts are only resecured when the user next logs in using standalone authentication, as the data required to resecure the account is not available to the server.

Workarounds

The issue may be mitigated by using SSO or client side certificates to log in. Please note that SSO and client side certificate authentication does not have this expectation of no-knowledge credential access, and cryptographic keys are available to the server administrator.

References

There are no references at this time.

For more information

If you have any questions or comments about this advisory: * Open an issue in the CaSS Project Github * Email us at the CaSS Project

Database specific
{
    "cwe_ids": [
        "CWE-325"
    ],
    "github_reviewed_at": "2022-05-25T19:34:20Z",
    "nvd_published_at": "2022-05-18T21:15:00Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / cassproject

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.8