Skip to content

Commit 072449d

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@6b7be80
1 parent 30536c3 commit 072449d

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-68113 (altcha): ALTCHA Proof-of-Work Vulnerable to Challenge Splicing
4+
and Replay'
5+
comments: false
6+
categories:
7+
- altcha
8+
advisory:
9+
gem: altcha
10+
cve: 2025-68113
11+
ghsa: 6gvq-jcmp-8959
12+
url: https://github.com/altcha-org/altcha-lib/security/advisories/GHSA-6gvq-jcmp-8959
13+
title: ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay
14+
date: 2025-12-16
15+
description: |
16+
### Impact
17+
18+
A cryptographic semantic binding flaw in ALTCHA libraries allows
19+
challenge payload splicing, which may enable replay attacks. The
20+
HMAC signature does not unambiguously bind challenge parameters to
21+
the nonce, allowing an attacker to reinterpret a valid proof-of-work
22+
submission with a modified expiration value.
23+
24+
This may allow previously solved challenges to be reused beyond
25+
their intended lifetime, depending on server-side replay handling
26+
and deployment assumptions.
27+
28+
The vulnerability primarily impacts abuse-prevention mechanisms such
29+
as rate limiting and bot mitigation.
30+
31+
It does not directly affect data confidentiality or integrity.
32+
33+
### Patches
34+
35+
This issue has been addressed by enforcing explicit semantic
36+
separation between challenge parameters and the nonce during
37+
HMAC computation.
38+
39+
Users are advised to upgrade to patched versions.
40+
41+
### Workarounds
42+
43+
As a mitigation, implementations may append a delimiter to the
44+
end of the `salt` value prior to HMAC computation (for example,
45+
`<salt>?expires=<time>&`). This prevents ambiguity between
46+
parameters and the nonce and is backward-compatible with existing
47+
implementations, as the delimiter is treated as a standard URL
48+
parameter separator."
49+
cvss_v3: 6.5
50+
patched_versions:
51+
- ">= 1.0.0"
52+
related:
53+
url:
54+
- https://nvd.nist.gov/vuln/detail/CVE-2025-68113
55+
- https://github.com/altcha-org/altcha-lib/security/advisories/GHSA-6gvq-jcmp-8959
56+
- https://github.com/altcha-org/altcha-lib-ex/commit/09b2bad466ad0338a5b24245380950ea9918333e
57+
- https://github.com/altcha-org/altcha-lib-go/commit/4a5610745ef79895a67bac858b2e4f291c2614b8
58+
- https://github.com/altcha-org/altcha-lib-java/commit/69277651fdd6418ae10bf3a088901506f9c62114
59+
- https://github.com/altcha-org/altcha-lib-php/commit/9e9e70c864a9db960d071c77c778be0c9ff1a4d0
60+
- https://github.com/altcha-org/altcha-lib-rb/commit/4fd7b64cbbfc713f3ca4e066c2dd466e3b8d359b
61+
- https://github.com/altcha-org/altcha-lib/commit/cb95d83a8d08e273b6be15e48988e7eaf60d5c08
62+
- https://github.com/altcha-org/altcha-lib-java/releases/tag/v1.3.0
63+
- https://github.com/altcha-org/altcha-lib-php/releases/tag/v1.3.1
64+
- https://github.com/altcha-org/altcha-lib/releases/tag/1.4.1
65+
- https://github.com/advisories/GHSA-6gvq-jcmp-8959
66+
---

0 commit comments

Comments
 (0)