Description
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
Remediation
References
https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41
https://github.com/kjur/jsrsasign/releases/tag/10.5.25
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896
https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
Related Vulnerabilities
CVE-2023-24057 Vulnerability in maven package ca.uhn.hapi.fhir:org.hl7.fhir.r4b
CVE-2022-24794 Vulnerability in npm package express-openid-connect
CVE-2020-25689 Vulnerability in maven package org.wildfly.core:wildfly-protocol
CVE-2020-5219 Vulnerability in maven package org.webjars.npm:angular-expressions
CVE-2016-10531 Vulnerability in maven package org.webjars.bower:marked