Skip to content

CVE-2022-24773 node-forge security vulnerability #1634

@dsuresh-ap

Description

@dsuresh-ap

[READ] Step 1: Are you in the right place?

  • For issues related to the code in this repository file a Github issue.
  • If the issue pertains to Cloud Firestore, read the instructions in the "Firestore issue"
    template.
  • For general technical questions, post a question on StackOverflow
    with the firebase tag.
  • For general Firebase discussion, use the firebase-talk
    google group.
  • For help troubleshooting your application that does not fall under one
    of the above categories, reach out to the personalized
    Firebase support channel.

[REQUIRED] Step 2: Describe your environment

  • Operating System version: macOS
  • Firebase SDK version: 9.5.0
  • Firebase Product: Firebase-admin-node
  • Node.js version: 10.16.3
  • NPM version: 7

[REQUIRED] Step 3: Describe the problem

node-forge needs to be updated to >=1.3.0 to address this security issue.

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check DigestInfo for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Steps to reproduce:

N/A

Relevant Code:

https://github.com/firebase/firebase-admin-node/blob/master/package.json#L168

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions