whatsapp-api-js is a TypeScript server agnostic Whatsapp's Official API framework. It's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid. Incorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted. This vulnerability is fixed in 4.0.3.
References
Configurations
History
19 Sep 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://github.com/Secreto31126/whatsapp-api-js/commit/56620c65126427496a94d176082fbd8393a95b6d - Patch | |
References | () https://github.com/Secreto31126/whatsapp-api-js/pull/371 - Patch | |
References | () https://github.com/Secreto31126/whatsapp-api-js/security/advisories/GHSA-mwhf-vhr5-7j23 - Vendor Advisory | |
Summary |
|
|
First Time |
Secreto31126 whatsapp-api-js
Secreto31126 |
|
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:secreto31126:whatsapp-api-js:*:*:*:*:*:node.js:*:* |
12 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-12 20:15
Updated : 2024-09-19 02:05
NVD link : CVE-2024-45607
Mitre link : CVE-2024-45607
CVE.ORG link : CVE-2024-45607
JSON object : View
Products Affected
secreto31126
- whatsapp-api-js
CWE