Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-45607
HistorySep 12, 2024 - 7:58 p.m.

CVE-2024-45607 whatsapp-api-js fails to validate message's signature

2024-09-1219:58:13
CWE-347
GitHub_M
github.com
7
whatsapp-api-js
signature validation
vulnerability
version 4.0.3 fix

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

whatsapp-api-js is a TypeScript server agnostic Whatsapp’s Official API framework. It’s possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-45607