CVE-2022-31053Improper Verification of Cryptographic Signature in Biscuit-auth Biscuit-go

Severity
9.8CRITICALNVD
EPSS
0.2%
top 54.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 13
Latest updateNov 14

Description

Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid Γ-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

Hackagebiscuitsec/biscuit-haskell0.1.0.00.2.0.0
crates.iobiscuitsec/biscuit-auth1.0.02.0.0

🔴Vulnerability Details

4
OSV
Improper Verification of Cryptographic Signature2025-11-14
OSV
Signature forgery in github.com/biscuit-auth/biscuit-go2022-08-15
OSV
Signature forgery in Biscuit2022-06-17
GHSA
Signature forgery in Biscuit2022-06-17