You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.
Workaround
The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
mend-for-github-combot
changed the title
jsrsasign-10.3.0.tgz: 2 vulnerabilities (highest severity is: 9.8)
jsrsasign-10.3.0.tgz: 2 vulnerabilities (highest severity is: 7.7)
Sep 8, 2024
mend-for-github-combot
changed the title
jsrsasign-10.3.0.tgz: 2 vulnerabilities (highest severity is: 7.7)
jsrsasign-10.3.0.tgz: 2 vulnerabilities (highest severity is: 7.7) unreachable
Oct 7, 2024
Vulnerable Library - jsrsasign-10.3.0.tgz
opensource free pure JavaScript cryptographic library supports RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp and CAdES and JSON Web Signature(JWS)/Token(JWT)/Key(JWK)
Library home page: https://registry.npmjs.org/jsrsasign/-/jsrsasign-10.3.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/jsrsasign/package.json
Found in HEAD commit: 1e5781423c543a0c9bfedb4c5a57ca049920974b
Vulnerabilities
Unreachable
Unreachable
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-25898
Vulnerable Library - jsrsasign-10.3.0.tgz
opensource free pure JavaScript cryptographic library supports RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp and CAdES and JSON Web Signature(JWS)/Token(JWT)/Key(JWK)
Library home page: https://registry.npmjs.org/jsrsasign/-/jsrsasign-10.3.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/jsrsasign/package.json
Dependency Hierarchy:
Found in HEAD commit: 1e5781423c543a0c9bfedb4c5a57ca049920974b
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
Publish Date: 2022-07-01
URL: CVE-2022-25898
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 1.3000001%
CVSS 3 Score Details (7.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2022-07-01
Fix Resolution: 10.5.25
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2024-21484
Vulnerable Library - jsrsasign-10.3.0.tgz
opensource free pure JavaScript cryptographic library supports RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp and CAdES and JSON Web Signature(JWS)/Token(JWT)/Key(JWK)
Library home page: https://registry.npmjs.org/jsrsasign/-/jsrsasign-10.3.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/jsrsasign/package.json
Dependency Hierarchy:
Found in HEAD commit: 1e5781423c543a0c9bfedb4c5a57ca049920974b
Found in base branch: main
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.
Workaround
The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
Publish Date: 2024-01-22
URL: CVE-2024-21484
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 0.1%
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-21484
Release Date: 2024-01-22
Fix Resolution: 11.0.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: