You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1 jsrsasign vulnerability found in yarn.lock 7 days ago
Remediation
Upgrade jsrsasign to version 10.2.0 or later. For example:
jsrsasign@^10.2.0:
version "10.2.0"
Always verify the validity and compatibility of suggestions with your codebase.
Details GHSA-27fj-mc8w-j9wg
critical severity
Vulnerable versions: < 10.2.0
Patched version: 10.2.0
Impact
Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding.
Decoded RSA signature value consists following form:
01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]
Its byte length shall be the same as RSA key length however such checking was not sufficient.
To make crafted message for practical attack is very hard.
Patches
Users validating RSA signature should upgrade to 10.2.0 or later.
Workarounds
There is no workaround. Not to use RSA signature validation in jsrsasign.
ACKNOWLEDGEMENT
Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
Hyperledger Cactus release version or commit (git rev-parse --short HEAD):
1.0.0-rc.2
Hyperledger Cactus Plugins/Connectors Used
Fabric
Additional context
This is a critical severity security bug and needs to be dealt with urgently.
The dependencies need to be upgraded project-wide.
The text was updated successfully, but these errors were encountered:
In the fabric connector I had to upgrade to a newer snapshot
version because we need the fresh typings from there.
Fixeshyperledger-cacti#1600
Signed-off-by: Peter Somogyvari <peter.somogyvari@accenture.com>
In the fabric connector I had to upgrade to a newer snapshot
version because we need the fresh typings from there.
Fixes#1600
Signed-off-by: Peter Somogyvari <peter.somogyvari@accenture.com>
Describe the bug
1 jsrsasign vulnerability found in yarn.lock 7 days ago
Remediation
Upgrade jsrsasign to version 10.2.0 or later. For example:
jsrsasign@^10.2.0:
version "10.2.0"
Always verify the validity and compatibility of suggestions with your codebase.
Details
GHSA-27fj-mc8w-j9wg
critical severity
Vulnerable versions: < 10.2.0
Patched version: 10.2.0
Impact
Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding.
Decoded RSA signature value consists following form:
01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]
Its byte length shall be the same as RSA key length however such checking was not sufficient.
To make crafted message for practical attack is very hard.
Patches
Users validating RSA signature should upgrade to 10.2.0 or later.
Workarounds
There is no workaround. Not to use RSA signature validation in jsrsasign.
ACKNOWLEDGEMENT
Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
Hyperledger Cactus release version or commit (git rev-parse --short HEAD):
1.0.0-rc.2
Hyperledger Cactus Plugins/Connectors Used
Fabric
Additional context
This is a critical severity security bug and needs to be dealt with urgently.
The dependencies need to be upgraded project-wide.
The text was updated successfully, but these errors were encountered: