1.3.1
11 years ago
2 years ago
Known vulnerabilities in the node-forge package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | <1.3.0 |
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA How to fix Improper Verification of Cryptographic Signature? Upgrade | <1.3.0 |
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to RSA's How to fix Improper Verification of Cryptographic Signature? Upgrade | <1.3.0 |
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | <1.0.0 |
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Open Redirect via PoC:
How to fix Open Redirect? Upgrade | <1.0.0 |
node-forge is a JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities. Affected versions of this package are vulnerable to Prototype Pollution via the Note: version 0.10.0 is a breaking change removing the vulnerable functions. POC:
How to fix Prototype Pollution? Upgrade | <0.10.0 |
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. This can cause an impact of about 10 seconds matching time for data 3K characters long. How to fix Regular Expression Denial of Service (ReDoS)? Update | <0.7.4 |
The problem begins when trying to compare two HMACs. This is the part of code that handles the comparison:
The issue is that the more bytes match in the two arrays, the more comparisons are formed and the longer it'll take to return a result. This may allow attackers to brute force their way into the servers. How to fix Timing Attack? Upgrade | <0.6.33 |