CVE Vulnerabilities

CVE-2023-46234

Improper Verification of Cryptographic Signature

Published: Oct 26, 2023 | Modified: Apr 10, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

browserify-sign is a package to duplicate the functionality of nodes crypto public key functions, much of this is based on Fedor Indutnys work on indutny/tls.js. An upper bound check issue in dsaVerify function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Browserify-signBrowserify*4.2.2 (excluding)
Red Hat Developer Hub 1.2 on RHEL 9RedHatrhdh/rhdh-hub-rhel9:1.2-154*
Node-browserify-signUbuntubionic*
Node-browserify-signUbuntuesm-apps/bionic*
Node-browserify-signUbuntuesm-apps/focal*
Node-browserify-signUbuntuesm-apps/jammy*
Node-browserify-signUbuntufocal*
Node-browserify-signUbuntujammy*
Node-browserify-signUbuntulunar*
Node-browserify-signUbuntumantic*
Node-browserify-signUbuntutrusty*
Node-browserify-signUbuntuxenial*

References