Skip to content

Validation bypass vulnerability

Low
Johannestegner published GHSA-4v2f-h8gj-r94j Sep 4, 2020

Package

personnummer

Affected versions

<1.1.0

Patched versions

1.1.0

Description

Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.

The issue is deemed being a Low severity vulnerability.

Impact

This vulnerability impacts users who rely on the for last digits of personnummer to be a real personnummer.

Patches

The issue have been patched in all repositories. The following versions should be updated to as soon as possible:

C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1

If you are using any of the earlier packages, please update to latest.

Workarounds

The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.

For more information

If you have any questions or comments about this advisory:

Credits

Niklas Sköldmark (Medborgarskolan)

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs