secp256k1-js implements ECDSA without required r and s validation, leading to signature forgery
- Severity:
- High
Description
The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
Recommendation
Update the @lionello/secp256k1-js package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.1.0
- Patched version(s): 1.1.0
References
Related Issues
- JWS and JWT signature validation vulnerability with special characters - CVE-2022-25898
- ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign - CVE-2020-14966
- Leading white space bypasses protocol validation - CVE-2022-24723
- parse-server auth adapter app ID validation can be circumvented - CVE-2022-39231
- Tags:
- npm
- @lionello/secp256k1-js
Anything's wrong? Let us know Last updated on January 28, 2023