First published: Fri Jul 01 2022(Updated: )
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Jsrsasign Project Jsrsasign | >=4.8.0<10.5.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25898 is a vulnerability in the package jsrsasign before version 10.5.25 which allows for improper verification of cryptographic signatures.
CVE-2022-25898 is considered critical with a severity score of 9.8.
The vulnerability affects jsrsasign package versions between 4.8.0 and 10.5.24.
To fix CVE-2022-25898, upgrade to jsrsasign version 10.5.25 or later.
One workaround is to validate the JWS or JWT signature to ensure it has proper encoding.