Miggo Logo

GHSA-55xh-53m6-936r: Improper Verification of Cryptographic Signature in aws-encryption-sdk-java

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/1/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.amazonaws:aws-encryption-sdk-javamaven< 1.9.01.9.0
com.amazonaws:aws-encryption-sdk-javamaven>= 2.0.0, < 2.2.02.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key issues: (1) Streaming APIs allowed access to plaintext before ECDSA signature validation, and (2) ECDSA signature verification logic failed to reject certain invalid signatures. The createDecryptingStream method is explicitly implicated in the advisory's description of the streaming vulnerability, as it enabled premature plaintext access. The decryption handler (createDecryptHandler) would logically contain the signature validation logic that improperly accepted invalid ECDSA signatures. These functions are core to the decryption flow and align with the described attack vectors (non-repudiation bypass and invalid signature acceptance). The high confidence stems from the advisory's direct mention of streaming API behavior and cryptographic validation flaws.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is **visory ***r*ss*s s*v*r*l LOW s*v*rity issu*s wit* str**min* si*n** m*ss***s *n* r*stri*tin* pro**ssin* o* **rt*in typ*s o* inv*li* m*ss***s. T*is up**t* ***r*ss*s *n issu* w**r* **rt*in inv*li* ***S* si*n*tur*s in*orr**tly p*ss**

Reasoning

T** vuln*r**ility st*ms *rom two k*y issu*s: (*) Str**min* *PIs *llow** ****ss to pl*int*xt ***or* ***S* si*n*tur* `v*li**tion`, *n* (*) ***S* si*n*tur* v*ri*i**tion lo*i* **il** to r*j**t **rt*in inv*li* si*n*tur*s. T** `*r**t****ryptin*Str**m` m*t*