CVE-2024-45607

whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:secreto31126:whatsapp-api-js:*:*:*:*:*:node.js:*:*

History

19 Sep 2024, 02:05

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Secreto31126 whatsapp-api-js
Secreto31126
CVSS v2 : unknown
v3 : 5.8
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:secreto31126:whatsapp-api-js:*:*:*:*:*:node.js:*:*
References () https://github.com/Secreto31126/whatsapp-api-js/commit/56620c65126427496a94d176082fbd8393a95b6d - () https://github.com/Secreto31126/whatsapp-api-js/commit/56620c65126427496a94d176082fbd8393a95b6d - Patch
References () https://github.com/Secreto31126/whatsapp-api-js/pull/371 - () https://github.com/Secreto31126/whatsapp-api-js/pull/371 - Patch
References () https://github.com/Secreto31126/whatsapp-api-js/security/advisories/GHSA-mwhf-vhr5-7j23 - () https://github.com/Secreto31126/whatsapp-api-js/security/advisories/GHSA-mwhf-vhr5-7j23 - Vendor Advisory

12 Sep 2024, 21:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-12 20:15

Updated : 2024-09-19 02:05


NVD link : CVE-2024-45607

Mitre link : CVE-2024-45607

CVE.ORG link : CVE-2024-45607


JSON object : View

Products Affected

secreto31126

  • whatsapp-api-js
CWE
NVD-CWE-Other CWE-347

Improper Verification of Cryptographic Signature