### [CVE-2019-9153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9153) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature. ### POC #### Reference - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ZenyWay/opgp-service-cve-2019-9153 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub