Vulnerabilities/

Improper Verification of Cryptographic Signature in node-forge (GHSA-cfm4-qjh2-4765)

Severity:
High

Description

RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.

Recommendation

Update the node-forge package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
node-forge
Anything's wrong? Let us know Last updated on February 12, 2025

This issue is available in SmartScanner Professional

See Pricing