ghsa-v62p-rq8g-8h59
Vulnerability from github
Summary
On historic but declared as supported Node.js versions (0.12-2.x), pbkdf2 silently disregards Uint8Array input
This only affects Node.js <3.0.0, but pbkdf2
claims to:
* Support Node.js >= 0.12 (and there seems to be ongoing effort in this repo to maintain that)
* Support Uint8Array
input (input is typechecked against Uint8Array, and the error message includes e.g. "Password must be a string, a Buffer, a typed array or a DataView"
Details
The error is in toBuffer
method
This vulnerability somehow even made it to tests: https://github.com/browserify/pbkdf2/commit/eb9f97a66ed83836bebc4ff563a1588248708501
There, resultsOld
(where mismatch results
) are just invalid output generated from empty password/salt instead of the supplied one
PoC
On Node.js/io.js < 3.0.0
```console
require('pbkdf2').pbkdf2Sync(new Uint8Array([1,2,3]), new Uint8Array([1,3,4]), 1024, 32, 'sha256')
// But that's just a hash of empty data with empty password:
require('pbkdf2').pbkdf2Sync('', '', 1024, 32, 'sha256')
// Node.js crypto is fine even on that version:
require('crypto').pbkdf2Sync(new Uint8Array([1,2,3]), new Uint8Array([1,3,4]), 1024, 32, 'sha256')
// Empty hash from Node.js, for comparison
require('crypto').pbkdf2Sync('', '', 1024, 32, 'sha256') ```
Impact
Static hashes being outputted and used as keys/passwords can completely undermine security That said, no one should be using those Node.js versions anywhere now, so I would recommend to just drop them This lib should not pretend to work on those versions while outputting static data though
Just updating to a fixed version is not enough: if anyone was using pbkdf2
lib (do not confuse with Node.js crypto.pbkdf2
) or anything depending on it with Node.js/io.js < 3.0.0, recheck where those keys went / how they were used, and take action accordingly
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.1.2" }, "package": { "ecosystem": "npm", "name": "pbkdf2" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.1.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-6547" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": true, "github_reviewed_at": "2025-06-23T22:42:00Z", "nvd_published_at": "2025-06-23T19:15:25Z", "severity": "CRITICAL" }, "details": "### Summary\n\nOn historic but declared as supported Node.js versions (0.12-2.x), pbkdf2 silently disregards Uint8Array input\n\nThis only affects Node.js \u003c3.0.0, but `pbkdf2` claims to:\n * Support Node.js [\u003e= 0.12](https://github.com/browserify/pbkdf2/blob/v3.1.2/package.json#L62) (and there seems to be ongoing effort in this repo to maintain that)\n * Support `Uint8Array` input (input is typechecked against Uint8Array, and the error message includes e.g. \"Password must be a string, a Buffer, a typed array or a DataView\"\n\n### Details\n\nThe error is in `toBuffer` method\n\nThis vulnerability somehow even made it to tests: https://github.com/browserify/pbkdf2/commit/eb9f97a66ed83836bebc4ff563a1588248708501\nThere, `resultsOld` (where mismatch `results`) are just invalid output generated from empty password/salt instead of the supplied one\n\n### PoC\n\nOn Node.js/io.js \u003c 3.0.0\n\n```console\n\u003e require(\u0027pbkdf2\u0027).pbkdf2Sync(new Uint8Array([1,2,3]), new Uint8Array([1,3,4]), 1024, 32, \u0027sha256\u0027)\n\u003cBuffer 21 53 cd 5b a5 f0 15 39 2f 68 e2 40 8b 21 ba ca 0e dc 7b 20 d5 45 a4 8a ea b5 95 9f f0 be bf 66\u003e\n\n// But that\u0027s just a hash of empty data with empty password:\n\u003e require(\u0027pbkdf2\u0027).pbkdf2Sync(\u0027\u0027, \u0027\u0027, 1024, 32, \u0027sha256\u0027)\n\u003cBuffer 21 53 cd 5b a5 f0 15 39 2f 68 e2 40 8b 21 ba ca 0e dc 7b 20 d5 45 a4 8a ea b5 95 9f f0 be bf 66\u003e\n\n// Node.js crypto is fine even on that version:\n\u003e require(\u0027crypto\u0027).pbkdf2Sync(new Uint8Array([1,2,3]), new Uint8Array([1,3,4]), 1024, 32, \u0027sha256\u0027)\n\u003cBuffer 78 10 cc 84 b7 bb 85 cd c8 37 ca 68 da a9 4c 33 db ae c2 3d 5b d4 95 76 da 33 f9 95 ac 51 f4 45\u003e\n\n// Empty hash from Node.js, for comparison\n\u003e require(\u0027crypto\u0027).pbkdf2Sync(\u0027\u0027, \u0027\u0027, 1024, 32, \u0027sha256\u0027)\n\u003cBuffer 21 53 cd 5b a5 f0 15 39 2f 68 e2 40 8b 21 ba ca 0e dc 7b 20 d5 45 a4 8a ea b5 95 9f f0 be bf 66\u003e\n```\n\n### Impact\n\nStatic hashes being outputted and used as keys/passwords can completely undermine security\nThat said, no one should be using those Node.js versions anywhere now, so I would recommend to just drop them\nThis lib should not pretend to work on those versions while outputting static data though\n\nJust updating to a fixed version is not enough: if anyone was using `pbkdf2` lib (do not confuse with Node.js `crypto.pbkdf2`) or anything depending on it with Node.js/io.js \u003c 3.0.0, recheck where those keys went / how they were used, and take action accordingly", "id": "GHSA-v62p-rq8g-8h59", "modified": "2025-06-23T22:42:00Z", "published": "2025-06-23T22:42:00Z", "references": [ { "type": "WEB", "url": "https://github.com/browserify/pbkdf2/security/advisories/GHSA-v62p-rq8g-8h59" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6547" }, { "type": "WEB", "url": "https://github.com/browserify/pbkdf2/commit/e3102a8cd4830a3ac85cd0dd011cc002fdde33bb" }, { "type": "PACKAGE", "url": "https://github.com/browserify/pbkdf2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H", "type": "CVSS_V4" } ], "summary": "pbkdf2 silently disregards Uint8Array input, returning static keys" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.