The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
References
Configurations
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41 - Patch, Third Party Advisory | |
References | () https://github.com/kjur/jsrsasign/releases/tag/10.5.25 - Release Notes, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 - Exploit, Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122 - Exploit, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.7 |
Information
Published : 2022-07-01 20:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-25898
Mitre link : CVE-2022-25898
CVE.ORG link : CVE-2022-25898
JSON object : View
Products Affected
jsrsasign_project
- jsrsasign
CWE
CWE-347
Improper Verification of Cryptographic Signature