Vulnerabilities (CVE)

Filtered by vendor Digitalbazaar Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24771 1 Digitalbazaar 1 Forge 2023-12-10 5.0 MEDIUM 7.5 HIGH
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
CVE-2022-24772 1 Digitalbazaar 1 Forge 2023-12-10 5.0 MEDIUM 7.5 HIGH
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
CVE-2022-24773 1 Digitalbazaar 1 Forge 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.
CVE-2022-0122 1 Digitalbazaar 1 Forge 2023-12-10 5.8 MEDIUM 6.1 MEDIUM
forge is vulnerable to URL Redirection to Untrusted Site
CVE-2020-7720 1 Digitalbazaar 1 Forge 2023-12-10 7.5 HIGH 7.3 HIGH
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.