Headline
GHSA-w45j-f832-hxvh: Client Certificates are accepted without CertificateVerify
Impact
A DTLS Client could provide a Certificate that it doesn’t posses the private key for and Pion DTLS wouldn’t reject it.
This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can’t be trusted when using a Pion DTLS server prior to v2.1.5
Patches
Upgrade to Pion DTLS v2.1.5
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.5
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Pion DTLS
- Email us at [email protected]
Client Certificates are accepted without CertificateVerify
Moderate severity GitHub Reviewed Published May 25, 2022 in pion/dtls • Updated May 25, 2022
Package
gomod github.com/pion/dtls (Go )
Affected versions
< 2.1.5
Patched versions
2.1.5
Description
Impact
A DTLS Client could provide a Certificate that it doesn’t posses the private key for and Pion DTLS wouldn’t reject it.
This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can’t be trusted when using a Pion DTLS server prior to v2.1.5
Patches
Upgrade to Pion DTLS v2.1.5
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.5
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Pion DTLS
- Email us at [email protected]
References
- GHSA-w45j-f832-hxvh
- https://nvd.nist.gov/vuln/detail/CVE-2022-29222
- pion/dtls@d2f7971
- https://github.com/pion/dtls/releases/tag/v2.1.5
Sean-Der published the maintainer security advisory
May 16, 2022
Severity
Moderate
5.9
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Weaknesses
CWE-295
CVE ID
CVE-2022-29222
GHSA ID
GHSA-w45j-f832-hxvh
Source code
github.com/pion/dtls
Improvements are not currently accepted on this advisory because it uses an unsupported versioning operator. Read more and discuss here.
Related news
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.