7.6 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
Cryptomator: Tampered vault configuration allows MITM attack on Hub API
Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1.
References
- https://github.com/cryptomator/cryptomator/commit/6b82abcd80449a30b561d823193f9ecea542a625 x_refsource_MISC
- https://github.com/cryptomator/cryptomator/releases/tag/1.19.1 x_refsource_MISC
- https://github.com/cryptomator/cryptomator/security/advisories/GHSA-34rf-rwr3-7g43 x_refsource_CONFIRM
- https://github.com/cryptomator/cryptomator/pull/4179 x_refsource_MISC
Affected products
- ==< 1.19.1
Matching in nixpkgs
pkgs.cryptomator
Free client-side encryption for your cloud files
pkgs.cryptomator-cli
Command line program to access encrypted Cryptomator vaults
Package maintainers
-
@bachp Pascal Bach <pascal.bach@nextrem.ch>
-
@gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
-
@masrlinu masrlinu