You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in dsaVerify function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
The dependency hierarchy listed here isn't the only way we get this dep. In addition:
yarn why browserify-sign
yarn why v1.22.19
[1/4] Why do we have the module "browserify-sign"...?
[2/4] Initialising dependency graph...
warning Resolution field "typescript@4.0.2" is incompatible with requested version "typescript@~4.5.2"
[3/4] Finding dependency...
[4/4] Calculating file sizes...
=> Found "browserify-sign@4.2.1"
info Reasons this module exists
- "_project_#@osd#ace#webpack#node-libs-browser#crypto-browserify" depends on it
- Hoisted from "_project_#@osd#ace#webpack#node-libs-browser#crypto-browserify#browserify-sign"
info Disk size without dependencies: "364KB"
info Disk size with unique dependencies: "1.19MB"
info Disk size with transitive dependencies: "2.31MB"
info Number of shared dependencies: 23
Done in 1.29s.
We can probably resolve this with a resolution of the sub-dep. However, this is another case where we're stuck/blocked on #1118 and #2875. For webpack 4, we're currently relying on this patched fork: https://www.npmjs.com/package/@amoo-miki/webpack
CVE-2023-46234 - Medium Severity Vulnerability
Vulnerable Library - browserify-sign-4.2.1.tgz
adds node crypto signing for browsers
Library home page: https://registry.npmjs.org/browserify-sign/-/browserify-sign-4.2.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/browserify-sign/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in
dsaVerify
function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.Publish Date: 2023-10-26
URL: CVE-2023-46234
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-x9w5-v3q2-3rhw
Release Date: 2023-10-26
Fix Resolution: browserify-sign - 4.2.2
The text was updated successfully, but these errors were encountered: