Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature. **Note:** The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.
History

Fri, 09 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Jan 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Svix svix-webhooks
CPEs cpe:2.3:a:svix:svix:*:*:*:*:*:*:*:* cpe:2.3:a:svix:svix-webhooks:*:*:*:*:*:*:*:*
Vendors & Products Svix svix
Svix svix-webhooks

Wed, 16 Oct 2024 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Svix
Svix svix
Weaknesses CWE-347
CPEs cpe:2.3:a:svix:svix:*:*:*:*:*:*:*:*
Vendors & Products Svix
Svix svix

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-02-13T05:00:02.196Z

Updated: 2025-05-09T18:25:35.884Z

Reserved: 2023-12-22T12:33:20.118Z

Link: CVE-2024-21491

cve-icon Vulnrichment

Updated: 2024-08-01T22:20:40.878Z

cve-icon NVD

Status : Modified

Published: 2024-02-13T05:15:08.873

Modified: 2025-05-09T19:15:59.640

Link: CVE-2024-21491

cve-icon Redhat

No data.