Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.clever-cloud/biscuit-java
  4. ›
  5. CVE-2022-31053

CVE-2022-31053: Improper Verification of Cryptographic Signature

June 17, 2022

Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid ?-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification. There are no known workarounds for this issue.

References

  • eprint.iacr.org/2020/1484
  • github.com/advisories/GHSA-75rw-34q6-72cr
  • github.com/biscuit-auth/biscuit/security/advisories/GHSA-75rw-34q6-72cr
  • nvd.nist.gov/vuln/detail/CVE-2022-31053

Code Behaviors & Features

Detect and mitigate CVE-2022-31053 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.0.0

Fixed versions

  • 2.0.0

Solution

Upgrade to version 2.0.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

maven/com.clever-cloud/biscuit-java/CVE-2022-31053.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:19 +0000.