WebAuthn4J Spring Security Improper signature counter value handling
Moderate severity
GitHub Reviewed
Published
Oct 16, 2023
in
webauthn4j/webauthn4j-spring-security
•
Updated Nov 7, 2023
Package
Affected versions
< 0.9.1.RELEASE
Patched versions
0.9.1.RELEASE
Description
Published by the National Vulnerability Database
Oct 16, 2023
Published to the GitHub Advisory Database
Oct 17, 2023
Reviewed
Oct 17, 2023
Last updated
Nov 7, 2023
Improper signature counter value handling
Impact
A flaw was found in webauthn4j-spring-security-core. When an authneticator returns an incremented signature counter value during authentication, webauthn4j-spring-security-core does not properly persist the value, which means cloned authenticator detection does not work.
An attacker who cloned valid authenticator in some way can use the cloned authenticator without being detected.
Patches
Please upgrade to
com.webauthn4j:webauthn4j-spring-security-core:0.9.1.RELEASE
References
For more details about WebAuthn signature counters, see WebAuthn specification 6.1.1. Signature Counter Considerations.
Reporter
This issue was discovered by Michael Budnick (@mbudnick)
References