Ruby Openssl Allows Incorrect Value Comparison
Critical severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jul 24, 2023
Description
Published by the National Vulnerability Database
Nov 16, 2018
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jun 9, 2023
Last updated
Jul 24, 2023
An issue was discovered in the OpenSSL library in Ruby when two
OpenSSL::X509::Name
objects are compared using==
, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of==
will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.References