CVE-2024-21491
low-risk
Published 2024-02-13
Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Svix-Webhooks
Affected Vendors
References (8)
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2024-0010.html
Third Party Advisory
https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2024-0010.html
Third Party Advisory
https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal