Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBnY3ItN3dtNC1tY3Y2
Sensitive Data Exposure in pem
Versions of pem
before 1.13.2 expose sensitive data when the readPkcs12
is used.
The readPkcs12
function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system.
Recommendation
Update to version 1.13.2 or later.
Permalink: https://github.com/advisories/GHSA-pgcr-7wm4-mcv6JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBnY3ItN3dtNC1tY3Y2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 5 years ago
Updated: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-pgcr-7wm4-mcv6
References:
- https://github.com/Dexus/pem/pull/217
- https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb
- https://www.npmjs.com/advisories/723
- https://snyk.io/vuln/SNYK-JS-PEM-173687
- https://github.com/advisories/GHSA-pgcr-7wm4-mcv6
Blast Radius: 35.3
Affected Packages
npm:pem
Dependent packages: 578Dependent repositories: 50,465
Downloads: 928,898 last month
Affected Version Ranges: < 1.13.2
Fixed in: 1.13.2
All affected versions: 0.1.0, 0.2.0, 0.2.1, 1.2.2, 1.3.0, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.5.0, 1.6.0, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.8.3, 1.9.0, 1.9.1, 1.9.2, 1.9.4, 1.9.6, 1.9.7, 1.9.8, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.12.0, 1.12.1, 1.12.2, 1.12.3, 1.12.4, 1.12.5, 1.12.6, 1.12.7, 1.12.8, 1.13.0, 1.13.1
All unaffected versions: 1.13.2, 1.14.0, 1.14.1, 1.14.2, 1.14.3, 1.14.4, 1.14.5, 1.14.6, 1.14.7, 1.14.8, 1.15.0, 1.15.1