The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
References
Link | Resource |
---|---|
https://github.com/kjur/jsrsasign/releases/tag/10.5.25 | Release Notes Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 | Exploit Patch Third Party Advisory |
https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-07-01 13:15
Updated : 2022-07-13 12:01
NVD link : CVE-2022-25898
Mitre link : CVE-2022-25898
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
jsrsasign_project
- jsrsasign