The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
References
Link | Resource |
---|---|
https://github.com/lionello/secp256k1-js/compare/1.0.1...1.1.0 | Patch Third Party Advisory |
https://github.com/lionello/secp256k1-js/issues/11 | Issue Tracking Third Party Advisory |
https://www.npmjs.com/package/@lionello/secp256k1-js | Product Third Party Advisory |
https://github.com/lionello/secp256k1-js/commit/302800f0370b42e360a33774bb808274ac729c2e | Patch Third Party Advisory |
Configurations
Information
Published : 2022-09-24 12:15
Updated : 2022-09-28 08:55
NVD link : CVE-2022-41340
Mitre link : CVE-2022-41340
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
secp256k1-js_project
- secp256k1-js