Show plain JSON{"containers": {"cna": {"affected": [{"product": "jsrsasign", "vendor": "n/a", "versions": [{"lessThan": "10.5.25", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Adi Malyanker"}, {"lang": "en", "value": "Or David"}], "datePublic": "2022-07-01T00:00:00", "descriptions": [{"lang": "en", "value": "The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitCodeMaturity": "PROOF_OF_CONCEPT", "integrityImpact": "LOW", "privilegesRequired": "LOW", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "CHANGED", "temporalScore": 7.3, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H/E:P", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"description": "Improper Verification of Cryptographic Signature", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-07-01T20:02:03", "orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "shortName": "snyk"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122"}, {"tags": ["x_refsource_MISC"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896"}, {"tags": ["x_refsource_MISC"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897"}, {"tags": ["x_refsource_MISC"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/kjur/jsrsasign/releases/tag/10.5.25"}], "title": "Improper Verification of Cryptographic Signature", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "report@snyk.io", "DATE_PUBLIC": "2022-07-01T20:00:02.599918Z", "ID": "CVE-2022-25898", "STATE": "PUBLIC", "TITLE": "Improper Verification of Cryptographic Signature"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "jsrsasign", "version": {"version_data": [{"version_affected": "<", "version_value": "10.5.25"}]}}]}, "vendor_name": "n/a"}]}}, "credit": [{"lang": "eng", "value": "Adi Malyanker"}, {"lang": "eng", "value": "Or David"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method."}]}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H/E:P", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Improper Verification of Cryptographic Signature"}]}]}, "references": {"reference_data": [{"name": "https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122"}, {"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896"}, {"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897"}, {"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898"}, {"name": "https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41", "refsource": "MISC", "url": "https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41"}, {"name": "https://github.com/kjur/jsrsasign/releases/tag/10.5.25", "refsource": "MISC", "url": "https://github.com/kjur/jsrsasign/releases/tag/10.5.25"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T04:49:44.368Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/kjur/jsrsasign/releases/tag/10.5.25"}]}]}, "cveMetadata": {"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730", "assignerShortName": "snyk", "cveId": "CVE-2022-25898", "datePublished": "2022-07-01T20:02:03.338204Z", "dateReserved": "2022-02-24T00:00:00", "dateUpdated": "2024-09-16T18:48:35.777Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}