CVE-2024-21530: cocoon Reuses a Nonce, Key Pair in Encryption
Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.
Note: The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng.
References
- github.com/advisories/GHSA-6878-6wc2-pf5h
- github.com/advisories/GHSA-r2jw-c95q-rj29
- github.com/fadeevab/cocoon
- github.com/fadeevab/cocoon/commit/1b6392173ce35db4736a94b62b2d2973f9a71441
- github.com/fadeevab/cocoon/issues/22
- nvd.nist.gov/vuln/detail/CVE-2024-21530
- rustsec.org/advisories/RUSTSEC-2023-0068.html
- security.snyk.io/vuln/SNYK-RUST-COCOON-6028364
Detect and mitigate CVE-2024-21530 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →