Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-46234

Опубликовано: 26 окт. 2023
Источник: redhat
CVSS3: 7.5

Описание

browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in dsaVerify function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

A flaw was found in browserify-sign node package. This issue may allow a malicious user to execute a signature forgery attack by not correctly checking cryptographic signatures for DSA data, resulting in a jeopardized environment.

Отчет

An attacker could impact the integrity of a server when handling unknown input due to the lack of DSA verification, for example, pretending to be a legitimate user, gaining unauthorized access. Therefore, the impact for this vulnerability is important. Red Hat Fuse 7 uses browserify-sign as a transitive development dependency, hence the Low impact.

Меры по смягчению последствий

No current mitigation is yet available for this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-api-rhel8Affected
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-db-migration-rhel8Affected
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-ui-rhel8Affected
OpenShift Serverlessbrowserify-signWill not fix
OpenShift Service Mesh 2openshift-service-mesh/kiali-rhel8Will not fix
Red Hat 3scale API Management Platform 2browserify-signWill not fix
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Not affected
Red Hat Ansible Automation Platform 2aap-azure-uiNot affected
Red Hat build of Apicurio Registry 2browserify-signNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-347
https://bugzilla.redhat.com/show_bug.cgi?id=2246470browserify-sign: upper bound check issue in dsaVerify leads to a signature forgery attack

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

CVSS3: 6.5
nvd
больше 1 года назад

browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

CVSS3: 7.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
больше 1 года назад

browserify-sign is a package to duplicate the functionality of node's ...

CVSS3: 7.5
github
больше 1 года назад

browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack

7.5 High

CVSS3