CVE-2022-24771

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:digitalbazaar:forge:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:51

Type Values Removed Values Added
References () https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 - Patch, Third Party Advisory () https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 - Patch, Third Party Advisory
References () https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 - Third Party Advisory () https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 - Third Party Advisory

Information

Published : 2022-03-18 14:15

Updated : 2024-11-21 06:51


NVD link : CVE-2022-24771

Mitre link : CVE-2022-24771

CVE.ORG link : CVE-2022-24771


JSON object : View

Products Affected

digitalbazaar

  • forge
CWE
CWE-347

Improper Verification of Cryptographic Signature