Skip to content

Signature verification vulnerability in Stark Bank ecdsa libraries

High severity GitHub Reviewed Published Nov 8, 2021 to the GitHub Advisory Database • Updated Mar 31, 2023

Package

maven com.starkbank:ecdsa-java (Maven)

Affected versions

= 1.0.0

Patched versions

1.0.1
pip starkbank-ecdsa (pip)
< 2.0.1
2.0.1
nuget starkbank-ecdsa (NuGet)
= 1.3.1
1.3.2
npm starkbank-ecdsa (npm)
= 1.1.2
1.1.3

Description

An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways.

References

Reviewed Nov 8, 2021
Published to the GitHub Advisory Database Nov 8, 2021
Last updated Mar 31, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-9wx7-jrvc-28mm

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.