Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731 | third party advisory patch |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732 | third party advisory patch |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733 | third party advisory patch |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734 | third party advisory patch |
https://github.com/kjur/jsrsasign/issues/598 | vendor advisory issue tracking exploit |
https://github.com/kjur/jsrsasign/releases/tag/11.0.0 | patch release notes |
https://people.redhat.com/~hkario/marvin/ |