Executive Summary

Informations
Name CVE-2024-21491 First vendor Publication 2024-02-13
Vendor Cve Last vendor Modification 2024-03-06

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21491

Sources (Detail)

https://github.com/svix/svix-webhooks/commit/958821bd3b956d1436af65f70a0964d4...
https://github.com/svix/svix-webhooks/pull/1190
https://rustsec.org/advisories/RUSTSEC-2024-0010.html
https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2024-03-06 17:27:33
  • Multiple Updates
2024-02-14 02:41:32
  • Multiple Updates
2024-02-14 02:41:18
  • Multiple Updates
2024-02-13 17:27:26
  • Multiple Updates
2024-02-13 09:27:24
  • First insertion