1.3.3
10 years ago
2 months ago
Known vulnerabilities in the org.webjars.npm:node-forge package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in ASN.1 structures during RSA signature verification. An attacker can bypass signature verification and inject forged signatures by crafting ASN.1 data with extra fields or insufficient padding, allowing unauthorized actions or data integrity violations. Note: This is only exploitable if the default verification scheme (RSASSA-PKCS1-v1_5) is used with the How to fix Improper Verification of Cryptographic Signature? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Certificate Validation in the How to fix Improper Certificate Validation? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Infinite loop via the How to fix Infinite loop? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the How to fix Improper Verification of Cryptographic Signature? A fix was pushed into the | [0,) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Uncontrolled Recursion via the How to fix Uncontrolled Recursion? Upgrade | [,1.3.3) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the How to fix Integer Overflow or Wraparound? Upgrade | [,1.3.3) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Interpretation Conflict via the How to fix Interpretation Conflict? Upgrade | [,1.3.3) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Open Redirect via PoC:
How to fix Open Redirect? Upgrade | [,1.3.1) |
org.webjars.npm:node-forge is a WebJar for node-forge. Affected versions of this package are vulnerable to Prototype Pollution via the Note: version 0.10.0 is a breaking change removing the vulnerable functions. POC:
How to fix Prototype Pollution? Upgrade | [,1.3.1) |