First published: Wed Apr 07 2021(Updated: )
### Impact Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding. Decoded RSA signature value consists following form: `01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]` Its byte length must be the same as RSA key length, however such checking was not sufficient. To make crafted message for practical attack is very hard. ### Patches Users validating RSA signature should upgrade to 10.2.0 or later. ### Workarounds There is no workaround. Not to use RSA signature validation in jsrsasign. ### ACKNOWLEDGEMENT Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/jsrsasign | <10.2.0 | 10.2.0 |
Jsrsasign Project Jsrsasign | <=10.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-30246 is critical with a severity value of 9.1.
CVE-2021-30246 allows the acceptance of RSA signatures with improper PKCS#1.5 padding, which can lead to vulnerabilities in the jsrsasign package.
To fix CVE-2021-30246, update the jsrsasign package to version 10.2.0 or higher.
The affected software for CVE-2021-30246 includes jsrsasign package versions up to and including 10.1.13 for Node.js.
The Common Weakness Enumeration (CWE) for CVE-2021-30246 is CWE-347.