-
Notifications
You must be signed in to change notification settings - Fork 316
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Any plans to address CVE-2023-22899 #485
Comments
The last commit (and issue closed) to this repo was September 12, 2022 (as of this writing). I don't think this software is abandonware. At this point, it would be helpful of @kennypatterson would share details of the reported MAC vulnerability so that maybe someone else could craft up a fix in a PR. I am quite curious about its implications in other projects that depend on this project. |
The paper states that:
So the "issue" could be here: zip4j/src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java Lines 126 to 135 in 733cb24
CVE finally rated this as:
|
I am looking into this issue |
@srikanth-lingala could you issue a new release with this fix? |
@srikanth-lingala When will you be publishing a new release? |
It's an open source project, so it doesn't actually depend on @srikanth-lingala to do all the work themselves. A little collaboration might help, here. I'm not really much of a Java guy, but there are millions who are. At any rate, it looks like commit 597b31a is intended to address this, but without a test case (ideally, provided by @kennypatterson or anyone else with details of the vulnerability), it's hard to prove that it actually fixes the issue. |
Sorry guys. I caught a nasty virus which took me down over the last days. Still recovering, but I should be able to continue with this fix now. |
CW: CVE pedantry
Technically, the National Vulnerability Database rated it as 5.9, as part of the CVMap program. The CVE Project does not itself provide ratings. Individual CVE Numbering Authorities (CNAs) may provide their own estimates of impact/risk/threatiness, and may express those as CVSS scores in their CVE entry definitions. The original definition does not. |
Issue fixed in v2.11.3 released today |
In the following document (https://breakingthe3ma.app/files/Threema-PST22.pdf), there is the following comment:
“In one of our attacks, we leveraged a vulnerability in a library, Zip4j, used by Threema to create backup zip files. We disclosed our findings to the author of Zip4j on 08.10.2022, proposing a 60-day disclosure period. At the time of writing, the author has yet to acknowledge our email."
Can you please comment on CVE-2023-22899 now that this vulnerability has been made public?
The text was updated successfully, but these errors were encountered: