blob: 414f12b009e1d8490ecbc094f6e68adb3ba4ff86 [file] [log] [blame]
id: GO-2023-2385
modules:
- module: github.com/pubnub/go
vulnerable_at: 4.10.0+incompatible
packages:
- package: github.com/pubnub/go/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v5
non_go_versions:
- fixed: 5.0.4-0.20231016150651-428517fef5b9
vulnerable_at: 5.0.3
packages:
- package: github.com/pubnub/go/v5/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v6
non_go_versions:
- fixed: 6.1.1-0.20231016150651-428517fef5b9
vulnerable_at: 6.1.0
packages:
- package: github.com/pubnub/go/v6/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
- module: github.com/pubnub/go/v7
versions:
- fixed: 7.2.0
vulnerable_at: 7.1.2
packages:
- package: github.com/pubnub/go/v7/utils
symbols:
- EncryptString
- DecryptString
- EncryptFile
- DecryptFile
- generateIV
- unpadPKCS7
- padWithPKCS7
- EncryptCipherKey
- aesCipher
derived_symbols:
- SerializeAndEncrypt
- SerializeEncryptAndSerialize
excluded_symbols:
- TestComplexClassDecryption
- TestComplexClassEncryption
summary: Insufficient entropy in AES-256-CBC in github.com/pubnub/go
description: |-
There is insufficient entropy in the implementation of the AES-256-CBC
cryptographic algorithm. The provided encrypt functions are less secure when hex
encoding and trimming are applied, leaving half of the bits in the key always
the same for every encoded message or file.
Users are encouraged to migrate to the new crypto package introduced in v7.2.0.
cves:
- CVE-2023-26154
ghsas:
- GHSA-5844-q3fc-56rh
references:
- advisory: https://github.com/advisories/GHSA-5844-q3fc-56rh
- fix: https://github.com/pubnub/go/commit/428517fef5b901db7275d9f5a75eda89a4c28e08
review_status: REVIEWED