Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nodejs
Nodejs nodejs |
|
CPEs | cpe:2.3:a:nodejs:nodejs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nodejs
Nodejs nodejs |
|
Metrics |
cvssV3_1
|
ssvc
|
Sat, 07 Sep 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Node.js. The privateDecrypt() API of the crypto library may allow a covert timing side-channel during PKCS#1 v1.5 padding error handling. This issue revealed significant timing differences in decryption for valid and invalid ciphertexts, which may allow a remote attacker to decrypt captured RSA ciphertexts or forge signatures, especially in scenarios involving API endpoints processing JSON Web Encryption messages. | Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key. |
References |
|
MITRE
Status: PUBLISHED
Assigner: hackerone
Published: 2024-09-07T16:03:32.996Z
Updated: 2024-09-09T18:00:37.229Z
Reserved: 2023-10-27T01:00:13.401Z
Link: CVE-2023-46809
Vulnrichment
Updated: 2024-09-09T17:42:38.836Z
NVD
Status : Awaiting Analysis
Published: 2024-09-07T16:15:02.343
Modified: 2024-09-09T18:35:01.803
Link: CVE-2023-46809
Redhat