Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24772
HistoryMar 18, 2022 - 1:30 p.m.

CVE-2022-24772 Improper Verification of Cryptographic Signature in `node-forge`

2022-03-1813:30:20
CWE-347
GitHub_M
www.cve.org
5
cve-2022-24772
transport layer security
rsa pkcs#1 v1.5
asn.1
signature verification
javascript
public exponent

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

36.5%

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a DigestInfo ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

CNA Affected

[
  {
    "product": "forge",
    "vendor": "digitalbazaar",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.3.0"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

36.5%