QID 982017

QID 982017: Nodejs (npm) Security Update for stellar-sdk (GHSA-6cgh-hjpw-q3gq)

The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.

Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.

Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution
    Customers are advised to refer to GHSA-6cgh-hjpw-q3gq for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 982017

    Software Advisories
    Advisory ID Software Component Link
    GHSA-6cgh-hjpw-q3gq stellar-sdk URL Logo github.com/advisories/GHSA-6cgh-hjpw-q3gq