GHSA-cfm4-qjh2-4765

Suggest an improvement
Source
https://github.com/advisories/GHSA-cfm4-qjh2-4765
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-cfm4-qjh2-4765/GHSA-cfm4-qjh2-4765.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-cfm4-qjh2-4765
Aliases
Related
Published
2022-03-18T23:09:54Z
Modified
2023-11-01T04:58:08.256994Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Improper Verification of Cryptographic Signature in node-forge
Details

Impact

RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.

Patches

The issue has been addressed in node-forge 1.3.0.

References

For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.

For more information

If you have any questions or comments about this advisory: * Open an issue in forge * Email us at example email address

Database specific
{
    "github_reviewed": true,
    "severity": "HIGH",
    "github_reviewed_at": "2022-03-18T23:09:54Z",
    "cwe_ids": [
        "CWE-347"
    ],
    "nvd_published_at": "2022-03-18T14:15:00Z"
}
References

Affected packages

npm / node-forge

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0