GHSA-9wx7-jrvc-28mm:
Signature verification vulnerability in Stark Bank ecdsa libraries
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
11/8/2021
Updated
3/31/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
starkbank-ecdsa | pip | < 2.0.1 | 2.0.1 |
com.starkbank:ecdsa-java | maven | = 1.0.0 | 1.0.1 |
starkbank-ecdsa | nuget | = 1.3.1 | 1.3.2 |
starkbank-ecdsa | npm | = 1.1.2 | 1.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub patch explicitly adds range checks for signature.r
and signature.s
in the verify()
method of ecdsa.py
. This matches the vulnerability description about signature forgery through improper cryptographic verification (CWE-347). The absence of these checks in pre-patch versions would allow acceptance of mathematically invalid signatures. While other language implementations (Java/Node/.NET) are also affected, the Python diff provides direct evidence of the vulnerable function location.