Vulnerability DatabaseGHSA-3wxm-m9m4-cprj

GHSA-3wxm-m9m4-cprj
vulnerability analysis and mitigation

Overview

A moderate severity vulnerability was identified in the google/exposure-notifications-server package affecting versions < 0.18.3 and >= 0.19.0, < 0.19.2. The vulnerability was discovered and published on April 1, 2021, with the identifier GHSA-3wxm-m9m4-cprj. The issue specifically affects installations using the export-importer service (GitHub Advisory).

Technical details

The vulnerability stems from the export-importer service's assumption that servers it was importing from had properly embargoed keys for at least 2 hours after their expiry time. However, instances were discovered where servers did not properly embargo keys, potentially leading to keys being re-published before their expiration (GitHub Advisory).

Impact

The vulnerability could allow imported keys to be re-published before they have expired, potentially enabling replay attacks of RPIs (Rolling Proximity Identifiers). It's important to note that installations not using the export-importer services are not impacted by this vulnerability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 0.18.3 and 0.19.2 and later. As a workaround, users should ensure that servers they are importing export zip files from are not publishing keys too early. For additional support, users can open an issue in the exposure-notifications-server repository or contact exposure-notifications-feedback@google.com (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management