GHSA-x4jg-mjrx-434g

Suggest an improvement
Source
https://github.com/advisories/GHSA-x4jg-mjrx-434g
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-x4jg-mjrx-434g/GHSA-x4jg-mjrx-434g.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-x4jg-mjrx-434g
Aliases
Published
2022-03-18T23:10:28Z
Modified
2023-11-01T04:58:08.317494Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Improper Verification of Cryptographic Signature in node-forge
Details

Impact

RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a DigestInfo ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used.

Patches

The issue has been addressed in node-forge 1.3.0.

References

For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.

For more information

If you have any questions or comments about this advisory: * Open an issue in forge * Email us at example email address

Database specific
{
    "nvd_published_at": "2022-03-18T14:15:00Z",
    "cwe_ids": [
        "CWE-347"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-03-18T23:10:28Z"
}
References

Affected packages

npm / node-forge

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Ecosystem specific

{
    "affected_functions": [
        "(node-forge).pki.rsa"
    ]
}