GHSA-g753-jx37-7xwh: ECDSA signature vulnerability of Minerva timing attack in jsrsasign
5.9
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/30/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
jsrsasign | npm | >= 4.0.0, < 8.0.13 | 8.0.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the ECPointFp.multiply
method's timing dependency on scalar bit values. The commit diff shows significant changes to this function in ext/ec.js
, adding dummy operations to create constant-time execution. The vulnerability documentation specifically mentions point multiplication timing as the root cause, and the patch directly modifies this function to mitigate the Minerva attack by introducing complementary scalar processing to eliminate timing variations.