GHSA-j57r-4qw6-58r3: rusty_paseto vulnerable to private key extraction due to ed25519-dalek dependency
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
11/7/2023
Updated
11/7/2023
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rusty-paseto | rust | <= 0.5.0 | 0.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from ed25519-dalek's pre-2.0 APIs for keypair serialization/deserialization. The commit diff shows replacements of Keypair/PublicKey usage with SigningKey/VerifyingKey from ed25519-dalek 2.0. The vulnerable functions are those handling cryptographic operations for V2/V4 public tokens, specifically where raw key bytes were processed using the old unsafe APIs. The high confidence comes from direct evidence in the diff showing migration from deprecated key handling methods to the safer 2.0 APIs.