
Cloud Vulnerability DB
A community-led vulnerabilities database
A high severity vulnerability was identified in the vp-toolkit npm package (GHSA-ff5x-w9wg-h275), affecting versions prior to 0.2.2. The vulnerability was discovered and published to the GitHub Advisory Database on March 6, 2020, with the latest update on January 9, 2023. The issue allows holders to generate proof of ownership for credentials they do not control (GitHub Advisory).
The vulnerability exists in the verifyVerifiablePresentation() method, which while checking the cryptographic integrity of the Verifiable Presentation, fails to verify if the credentialSubject.id DID matches the signer of the VP proof. This oversight in the verification process creates a security gap in the credential verification system (GitHub Advisory).
The vulnerability primarily affects verifiers using the vp-toolkit, as it could allow unauthorized parties to generate proofs for credentials they don't legitimately own. This could potentially lead to false verification of credentials and compromise the integrity of the verification system (GitHub Advisory).
A patch is available in version 0.2.2 of the vp-toolkit. As a workaround, users can compute the address from the verifiablePresentation.proof.n.verificationMethod using getAddressFromPubKey() from crypt-util@0.1.5 and match it with the credentialSubject.id address from the credential (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."