### [CVE-2021-32685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32685) ![](https://img.shields.io/static/v1?label=Product&message=tEnvoy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.0.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen) ### Description tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-512 hash matching the SHA-512 hash of the message even if the signature was invalid. This issue is patched in version 7.0.3. As a workaround: In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon