Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 | Patch Third Party Advisory |
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 | Third Party Advisory |
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 | Patch Third Party Advisory |
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 - Patch, Third Party Advisory | |
References | () https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 - Third Party Advisory |
Information
Published : 2022-03-18 14:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-24771
Mitre link : CVE-2022-24771
CVE.ORG link : CVE-2022-24771
JSON object : View
Products Affected
digitalbazaar
- forge
CWE
CWE-347
Improper Verification of Cryptographic Signature