Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 | Third Party Advisory |
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-03-18 07:15
Updated : 2022-03-28 06:53
NVD link : CVE-2022-24771
Mitre link : CVE-2022-24771
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
digitalbazaar
- forge