Improper Verification of Cryptographic Signature
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Jun 21, 2021 
          to the GitHub Advisory Database
          •
          Updated Feb 1, 2023 
      
  
Description
        Published by the National Vulnerability Database
      Jun 16, 2021 
    
  
        Reviewed
      Jun 17, 2021 
    
  
        Published to the GitHub Advisory Database
      Jun 21, 2021 
    
  
        Last updated
      Feb 1, 2023 
    
  
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the
verifyWithMessagemethod oftEnvoyNaClSigningKeyalways returnstruefor any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: Intenvoy.jsunder theverifyWithMessagemethod definition within thetEnvoyNaClSigningKeyclass, ensure that the return statement call tothis.verifyends in.verified.References