fix(deps): update dependency node-forge to v1.3.0 [security] #20727
+6
−6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.0.0
->1.3.0
GitHub Vulnerability Alerts
CVE-2022-24771
Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.
Patches
The issue has been addressed in
node-forge
1.3.0
.References
For more information, please see
"Bleichenbacher's RSA signature forgery based on implementation error"
by Hal Finney.
For more information
If you have any questions or comments about this advisory:
CVE-2022-24772
Impact
RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a
DigestInfo
ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used.Patches
The issue has been addressed in
node-forge
1.3.0
.References
For more information, please see
"Bleichenbacher's RSA signature forgery based on implementation error"
by Hal Finney.
For more information
If you have any questions or comments about this advisory:
CVE-2022-24773
Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking
DigestInfo
for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.Patches
The issue has been addressed in
node-forge
1.3.0
.For more information
If you have any questions or comments about this advisory:
Release Notes
digitalbazaar/forge
v1.3.0
Compare Source
Security
Yahyazadeh (moosa-yahyazadeh@uiowa.edu).
digestAlgorithm
structure can lead tosignature forgery.
allow a crafted structure that steals padding bytes and uses unchecked
portion of the PKCS#1 encoded message to forge a signature when a low
public exponent is being used. For more information, please see
"Bleichenbacher's RSA signature forgery based on implementation
error"
by Hal Finney.
forgery.
DigestInfo
ASN.1 structure. This can allow padding bytes to be removedand garbage data added to forge a signature when a low public exponent is
being used. For more information, please see "Bleichenbacher's RSA
signature forgery based on implementation
error"
by Hal Finney.
DigestInfo
is not properly checked for proper ASN.1 structure. This canlead to successful verification with signatures that contain invalid
structures but a valid digest.
Fixed
fromDer
is now more strict and will default to ensuring all inputbytes are parsed or throw an error. A new option
parseAllBytes
can disablethis behavior.
security issues with crafted inputs. It is possible that code doing custom
DER parsing may need to adapt to this new behavior and optional flag.
RSASSA-PKCS-v1_5
DigestInfo
data. Additionally check that the hashalgorithm identifier is a known value from RFC 8017
PKCS1-v1-5DigestAlgorithms
. An invalidDigestInfo
or algorithm identifierwill now throw an error.
since it could lead to security issues with crafted inputs. It is possible
that code may have to handle the errors from these stricter checks.
Added
identifiers:
1.2.840.113549.2.2
/md2
2.16.840.1.101.3.4.2.4
/sha224
2.16.840.1.101.3.4.2.5
/sha512-224
2.16.840.1.101.3.4.2.6
/sha512-256
v1.2.1
Compare Source
Fixed
reporting.
URLSearchParams
.v1.2.0
Compare Source
Fixed
message.
Added
1.3.14.3.2.29 / sha1WithRSASignature
for sha1 withRSA. Considered a deprecated equivalent to
1.2.840.113549.1.1.5 / sha1WithRSAEncryption
. See discussion andlinks.
Changed
digest given an signature algorithm OID. Add helper function to verify
signatures.
v1.1.0
Compare Source
Fixed
behavior of openssl.
CERTIFICATE REQUEST" handled as "BEGIN CERTIFICATE REQUEST".
Configuration
📅 Schedule: "" in timezone America/New_York.
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.