Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yOHI5LXBxNGMtd3AzY84AAu94

personnummer/rust vulnerable to Improper Input Validation

This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.

The vulnerability is determined to be low severity.

Impact

This vulnerability impacts users who rely on the for last digits of personnummer to be a real personnummer.

Patches

The issue have been patched in all repositories. The following versions should be updated to as soon as possible:

C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1

If you are using any of the earlier packages, please update to latest.

Workarounds

The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-28r9-pq4c-wp3c
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yOHI5LXBxNGMtd3AzY84AAu94
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago


Identifiers: GHSA-28r9-pq4c-wp3c
References: Repository: https://github.com/personnummer/rust
Blast Radius: 1.0

Affected Packages

cargo:personnummer
Dependent packages: 1
Dependent repositories: 0
Downloads: 5,430 total
Affected Version Ranges: < 3.0.1
Fixed in: 3.0.1
All affected versions: 0.1.0
All unaffected versions: 3.0.1, 3.0.2, 3.1.0, 3.1.1