Lucene search

K
nvd[email protected]NVD:CVE-2024-45607
HistorySep 12, 2024 - 8:15 p.m.

CVE-2024-45607

2024-09-1220:15:05
CWE-347
web.nvd.nist.gov
5
whatsapp-api-js
typescript
whatsappapi
payload validation
signature
access control
4.0.3
vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

whatsapp-api-js is a TypeScript server agnostic Whatsapp’s Official API framework. It’s possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.

Affected configurations

Nvd
Node
secreto31126whatsapp-api-jsRange4.0.04.0.3node.js
VendorProductVersionCPE
secreto31126whatsapp-api-js*cpe:2.3:a:secreto31126:whatsapp-api-js:*:*:*:*:*:node.js:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

21.3%

Related for NVD:CVE-2024-45607